JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
6964834e35a43590b13e8cf1cab94e21_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6964834e35a43590b13e8cf1cab94e21_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
6964834e35a43590b13e8cf1cab94e21_JaffaCakes118
Size
24KB
MD5
6964834e35a43590b13e8cf1cab94e21
SHA1
7f0a8f1733b79a9b44268d07a22b40e6296d22a5
SHA256
51826de0a8729e83c1a8ef71b7c8c95e9d77e58b88df244864207e0a00da3dbe
SHA512
6bb5490e95b8b4732012cb074f2a8ff532ea11f5c77fb6a2183d69f55af8cfd3c46e9e3a5728cef1a4f4aef622ac00a7615b1f47c82c4924f7998dba6f1b8eee
SSDEEP
192:00X1jVA/uCf8SVCEjWIzZfcTx1Ti5Jm2X1AjTCaaU1hziYm49n6JC03zhc/:Z1VAGxSVDdNcTvi5BX1qda2n6JTzh
Checks for missing Authenticode signature.
resource |
---|
6964834e35a43590b13e8cf1cab94e21_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentProcess
GetCurrentProcessId
GetProcAddress
LoadLibraryA
CreateEventA
GlobalLock
GlobalAlloc
GetModuleHandleA
Sleep
WideCharToMultiByte
MultiByteToWideChar
FindFirstFileA
VirtualProtectEx
CloseHandle
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateThread
CreateMutexA
ReadProcessMemory
GetCurrentDirectoryA
lstrlenA
WaitForSingleObject
WriteProcessMemory
VirtualProtect
SetEvent
KillTimer
wsprintfA
DefWindowProcA
SetTimer
PostQuitMessage
DestroyWindow
DispatchMessageA
PostThreadMessageA
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
LoadIconA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
GetStockObject
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
send
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
_strlwr
memcmp
memset
strcpy
strcat
fclose
fputs
fopen
strcmp
fread
memcpy
strlen
__CxxFrameHandler
??2@YAPAXI@Z
free
_initterm
malloc
_adjust_fdiv
_itoa
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ