d:\Projects\AKL\kh\Release\kh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8499922ab422c17e550a724083be50c7_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8499922ab422c17e550a724083be50c7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8499922ab422c17e550a724083be50c7_JaffaCakes118
-
Size
8KB
-
MD5
8499922ab422c17e550a724083be50c7
-
SHA1
914aa24da69f9882d12d7d7cceae38de4dbcad1c
-
SHA256
894ff0262900acdc5b0266f75b2db829d3dec9a059f28888d5c0997d5b76db8a
-
SHA512
9d2e7619c7e8e459449a7f70d581ae52a1d33ba1c90b2a14812c2a44474451dc06e78a8e410aae5e7caf9306bbe739b1eeca1a1bc167498a982d9f1320dbbd1b
-
SSDEEP
192:B3mZwiCbc31JY58VINWkoHqDH7yD6p99:mybU1JY5cbqU6p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8499922ab422c17e550a724083be50c7_JaffaCakes118
Files
-
8499922ab422c17e550a724083be50c7_JaffaCakes118.dll windows:4 windows x86 arch:x86
56a0310cc21e13f1fbc0b10b145ff8ee
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
LoadLibraryA
GetLastError
InterlockedExchange
FreeLibrary
GetProcAddress
LocalFree
LocalAlloc
RaiseException
user32
GetFocus
CallNextHookEx
SendMessageW
SetWindowsHookExW
RegisterWindowMessageW
IsWindow
GetKeyboardState
ToUnicodeEx
PostMessageW
keybd_event
MapVirtualKeyW
UnhookWindowsHookEx
GetKeyboardLayout
Exports
Exports
AddMonitoredWnd
ClearKeyHook
ClearMsgHook
ClearWndCallHook
RemoveMonitoredWnd
SetKeyHook
SetMsgHook
SetWndCallHook
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JOE Size: 512B - Virtual size: 408B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ