EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
Static task
static1
Behavioral task
behavioral1
Sample
a802c85f12e8c4ecb1b8dfd8efedc285_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a802c85f12e8c4ecb1b8dfd8efedc285_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a802c85f12e8c4ecb1b8dfd8efedc285_JaffaCakes118
Size
990KB
MD5
a802c85f12e8c4ecb1b8dfd8efedc285
SHA1
ee8599641381cddf8936f96f832bc40251ed0067
SHA256
eb3d2c90a55e9de75e904acb31ebc64665e2fe1b7a335a9a47be363a02443bee
SHA512
eafad35fac0645f47bd585046337cd57f7bfe48fe743e39ccae4c62300899bb8d3f059a29e717420a950d12376d45e1f58ebf80a9248ee77fbd7cf77a6667c39
SSDEEP
12288:hdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlk:
Checks for missing Authenticode signature.
resource |
---|
a802c85f12e8c4ecb1b8dfd8efedc285_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetWindowTextA
GetWindowLongA
GetForegroundWindow
GetDC
GetClientRect
GetClassNameA
EnumWindows
wsprintfA
ExitThread
GetCurrentProcess
GetCurrentProcessId
GetFileSize
GetModuleFileNameA
GetProcAddress
GetTempPathA
GetWindowsDirectoryA
GlobalAlloc
DisableThreadLibraryCalls
MultiByteToWideChar
ReadFile
ReadProcessMemory
RtlMoveMemory
DeleteFileA
SetFileAttributesA
SetFilePointer
Sleep
TerminateProcess
VirtualAlloc
VirtualFree
VirtualProtectEx
WideCharToMultiByte
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
CreateFileA
CloseHandle
RtlZeroMemory
LoadLibraryA
RegQueryValueExA
StrChrA
StrStrA
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
SelectObject
DeleteObject
CLSIDFromString
GdipCreateBitmapFromHBITMAP
GdiplusStartup
GdiplusShutdown
GdipSaveImageToFile
GdipDisposeImage
closesocket
connect
gethostbyname
inet_addr
ntohs
recv
send
socket
WSACleanup
WSAStartup
strrchr
EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ