EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
Static task
static1
Behavioral task
behavioral1
Sample
617c851eb9689fc37facd2af319b861a_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
617c851eb9689fc37facd2af319b861a_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
617c851eb9689fc37facd2af319b861a_JaffaCakes118
Size
39KB
MD5
617c851eb9689fc37facd2af319b861a
SHA1
d55b1435f00d9c1e765b559d9b2eff37eeb8546d
SHA256
84bd8cc2c6205690d7a79d10af7569e6ada56d7c56027b29b6229d8b3c35037d
SHA512
adeadc797934213b0f738e7c7f3e6ae3bce1bac5373a5e3bd3752eacf2b4fb74e6995fe6a43fe4820e1f69c531ae504541c3f921f1a5987b1241cea06b4861f9
SSDEEP
768:Lw2dUwHubkIuMtG4JsfV04J3M1Iw2dUwHubkIuMtG4JsfV04J3M1:Lw2dUwHubkIuMU4ccWw2dUwHubkIuMUm
Checks for missing Authenticode signature.
resource |
---|
617c851eb9689fc37facd2af319b861a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetForegroundWindow
GetClassNameA
wsprintfA
lstrlenA
CloseHandle
CreateFileA
CreateThread
DisableThreadLibraryCalls
GetCurrentProcess
GetModuleFileNameA
GetPrivateProfileStringA
GetProcAddress
GetWindowsDirectoryA
GlobalAlloc
LoadLibraryA
MultiByteToWideChar
ReadFile
ReadProcessMemory
RtlZeroMemory
SetFileAttributesA
SetFilePointer
Sleep
TerminateProcess
VirtualProtectEx
WideCharToMultiByte
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
RegQueryValueExA
EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ