JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
84a2da077179dd5856123ca25886d115_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
84a2da077179dd5856123ca25886d115_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
84a2da077179dd5856123ca25886d115_JaffaCakes118
Size
24KB
MD5
84a2da077179dd5856123ca25886d115
SHA1
da7a026d0af9328e7f2acd872c57782659d92ddd
SHA256
a73004ad40d220a07904e690eacaa02b2fdbb578107e867ad320ca188dff8b53
SHA512
6182aadab5d5751733df02945425e5641463fcbbeaf08f22bf431bbc8a57ef58d302545598bc2197cd82432b45247530643860ebf72cb78c09e722c307e1688d
SSDEEP
192:PV/1ffFmcTt4+Mzc13+l4IfqRd7O497FAUFWSTCaaU1hziYm4xIpNW:d/1focp4+DJ+iIyRd7O45NkSdaH7W
Checks for missing Authenticode signature.
resource |
---|
84a2da077179dd5856123ca25886d115_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
CreateEventA
lstrlenA
Sleep
WideCharToMultiByte
VirtualProtect
CloseHandle
TerminateProcess
OpenProcess
GetProcAddress
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateThread
CreateMutexA
ReadProcessMemory
GetCurrentDirectoryA
MultiByteToWideChar
WaitForSingleObject
WriteProcessMemory
Process32Next
SetEvent
KillTimer
wsprintfA
DefWindowProcA
SetTimer
PostQuitMessage
DestroyWindow
DispatchMessageA
PostThreadMessageA
LoadCursorA
LoadIconA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
GetStockObject
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
send
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
strlen
memset
strcpy
_strlwr
memcmp
fclose
fread
fputs
fopen
strcmp
memcpy
strcat
__CxxFrameHandler
??2@YAPAXI@Z
free
malloc
_adjust_fdiv
_itoa
_initterm
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ