EjectDll
GetId
InjectDll
Static task
static1
Behavioral task
behavioral1
Sample
WJXSmartFocus300/WJXHook.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
WJXSmartFocus300/WJXHook.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
WJXSmartFocus300/WJXSmartFocus.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
WJXSmartFocus300/WJXSmartFocus.exe
Resource
win10v2004-20240709-en
Target
69332691d979cbce7cf978df67635551_JaffaCakes118
Size
863KB
MD5
69332691d979cbce7cf978df67635551
SHA1
15e9990ad9cc3da899695f43f3c7fbaf9b64c117
SHA256
c829599c36ebff5216876a8c446238b8057bac1556c6d0f510c06ce80cebe7c6
SHA512
98b48e926e71db9640a5741bc6cbfb5a1fdc8817c02c3522f585917ce07176075ea92c1d30749eccd75bb2eb0c7f1b8afa728515f67a1a62d44bc47c48942657
SSDEEP
24576:mnru0s8o8TwSImjbe4JX8UI1lVSShsE+DI8PpJ:mru008TLB3e4J0rVVsE18Pb
Checks for missing Authenticode signature.
resource |
---|
unpack001/WJXSmartFocus300/WJXHook.dll |
unpack001/WJXSmartFocus300/WJXSmartFocus.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
RegisterWindowMessageA
EjectDll
GetId
InjectDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE