EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
Static task
static1
Behavioral task
behavioral1
Sample
633a0e5cf6508b15f365c6c515928374_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
633a0e5cf6508b15f365c6c515928374_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
633a0e5cf6508b15f365c6c515928374_JaffaCakes118
Size
973KB
MD5
633a0e5cf6508b15f365c6c515928374
SHA1
1ac503c4893cda34a4d1ccf8c95c36f7ac2dbfb2
SHA256
d9ff784cba0d61c25344618b2f0a181a4a75c2d461d5e4061563247eac4ff381
SHA512
b433cf8545ca3bd4dd6803baa766a3501975f848073fc524d50bfb5848bc7184b782fd07df00967781a4a9498cddd2df3fe59aae339e86669085981050ff1fa6
SSDEEP
12288:aSVISVISVISVISVISVISVISVISVISVISVISVISVISVISVISVISVISVISVISVISV/:
Checks for missing Authenticode signature.
resource |
---|
633a0e5cf6508b15f365c6c515928374_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetWindowTextA
GetWindowLongA
GetForegroundWindow
GetDC
GetClientRect
GetClassNameA
EnumWindows
wsprintfA
ExitThread
GetCurrentProcess
GetCurrentProcessId
GetFileSize
GetModuleFileNameA
GetProcAddress
GetTempPathA
GetWindowsDirectoryA
GlobalAlloc
DisableThreadLibraryCalls
MultiByteToWideChar
ReadFile
ReadProcessMemory
RtlMoveMemory
DeleteFileA
SetFileAttributesA
SetFilePointer
Sleep
TerminateProcess
VirtualAlloc
VirtualFree
VirtualProtectEx
WideCharToMultiByte
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
CreateFileA
CloseHandle
RtlZeroMemory
LoadLibraryA
RegQueryValueExA
StrChrA
StrStrA
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
SelectObject
DeleteObject
CLSIDFromString
GdipCreateBitmapFromHBITMAP
GdiplusStartup
GdiplusShutdown
GdipSaveImageToFile
GdipDisposeImage
closesocket
connect
gethostbyname
inet_addr
ntohs
recv
send
socket
WSACleanup
WSAStartup
strrchr
EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ