EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
Static task
static1
Behavioral task
behavioral1
Sample
8b65c99276c565c4228785c291685849_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8b65c99276c565c4228785c291685849_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
8b65c99276c565c4228785c291685849_JaffaCakes118
Size
940KB
MD5
8b65c99276c565c4228785c291685849
SHA1
b17ead834aa022e172c796c9bf2a62cb3d244ce1
SHA256
c5b1fa56733b8495226488d0a73b19134c6abe4d331db1859ab16be5fc46c942
SHA512
b8e19c212c05d8c16717fc2af6c5160f257cd4545c35f3525e82e20350f52825d205211b45a651a5eb93432f91f25488c0929ce9bdaea175f2f2cb49c7b6a637
SSDEEP
24576:JFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF:JFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFT
Checks for missing Authenticode signature.
resource |
---|
8b65c99276c565c4228785c291685849_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetWindowTextA
IsWindowVisible
IsWindowEnabled
GetWindowLongA
GetMessageA
GetForegroundWindow
GetDC
GetClientRect
GetClassNameA
EnumWindows
wsprintfA
ExitThread
GetCurrentDirectoryA
GetCurrentProcess
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetSystemDirectoryA
DisableThreadLibraryCalls
GlobalAlloc
LoadLibraryA
MultiByteToWideChar
ReadFile
DeleteFileA
RtlZeroMemory
SetFileAttributesA
SetFilePointer
Sleep
TerminateProcess
VirtualAlloc
VirtualFree
VirtualProtectEx
WideCharToMultiByte
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
CreateFileA
CloseHandle
RtlMoveMemory
GetTempPathA
RegQueryValueExA
StrChrA
StrStrA
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
SelectObject
DeleteObject
CLSIDFromString
GdipCreateBitmapFromHBITMAP
GdiplusStartup
GdiplusShutdown
GdipSaveImageToFile
GdipDisposeImage
closesocket
connect
gethostbyname
inet_addr
ntohs
recv
send
socket
WSACleanup
WSAStartup
strrchr
EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ