UnHook
installhook
Static task
static1
Behavioral task
behavioral1
Sample
411b687cd234d52ae3052767f45c60ab_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
411b687cd234d52ae3052767f45c60ab_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
411b687cd234d52ae3052767f45c60ab_JaffaCakes118
Size
236KB
MD5
411b687cd234d52ae3052767f45c60ab
SHA1
6f388e90b0c29fc56b1ea8fd7dba32d16c2fc5dd
SHA256
4b311e21653a1413f973bdf091f9fbc4ef55fb284ed41ee1e6f85e238a30bf13
SHA512
f50ccb58297c898108adc0f2eee1732c716fa6a88bc7f1d28af3c9c71c43bb218269e20a7a0fd2ab3077b530eb34ea1e03485c9bc32cc269cd18001be755e881
SSDEEP
3072:RJJU4VvYLijlU6nTDgvEvnokhvrPLvZBovA0R:RJJhgLedkEPoel0R
Checks for missing Authenticode signature.
resource |
---|
411b687cd234d52ae3052767f45c60ab_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersionExA
CloseHandle
UnmapViewOfFile
OpenProcess
MapViewOfFile
OpenFileMappingA
WriteProcessMemory
ReadProcessMemory
GetProcAddress
LoadLibraryA
CreateThread
WritePrivateProfileStringA
lstrcatA
GetSystemDirectoryA
GetPrivateProfileIntA
Process32Next
TerminateProcess
Process32First
CreateToolhelp32Snapshot
GetPrivateProfileStringA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
LCMapStringW
LCMapStringA
ReadFile
SetEndOfFile
Sleep
GetOEMCP
GetACP
GetCPInfo
UnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
SetFilePointer
CreateFileA
FlushFileBuffers
SetStdHandle
VirtualAlloc
HeapReAlloc
HeapAlloc
SetConsoleCtrlHandler
VirtualFree
HeapFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
RtlUnwind
GetCommandLineA
GetVersion
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
GetModuleFileNameA
ExitProcess
GetCurrentProcess
IsBadWritePtr
IsBadReadPtr
HeapValidate
EnterCriticalSection
LeaveCriticalSection
GetLastError
InitializeCriticalSection
DeleteCriticalSection
FatalAppExitA
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetCurrentThread
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
SetEnvironmentVariableA
SendMessageA
FindWindowExA
FindWindowA
SetTimer
wsprintfA
KillTimer
GetWindow
PostMessageA
IsWindowVisible
GetClassNameA
EnumChildWindows
CallNextHookEx
GetClientRect
UnhookWindowsHookEx
SetWindowsHookExA
InternetCloseHandle
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetOpenA
InternetReadFile
InternetOpenUrlA
InternetConnectA
inet_addr
send
recv
WSACleanup
inet_ntoa
gethostbyname
gethostname
WSAStartup
UnHook
installhook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ