c:\Users\M\Documents\ZeroX Base\Release\Gonzo's Public Hook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Gonzo's Public Hook.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Gonzo's Public Hook.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Gonzo's Public Hook.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Gonzo's Public Hook.exe
Resource
win10v2004-20240802-en
General
-
Target
ae0f1b3153590211fad50e422b07a903_JaffaCakes118
-
Size
262KB
-
MD5
ae0f1b3153590211fad50e422b07a903
-
SHA1
604224465c546813fa270622908ef0151d651573
-
SHA256
82a1a515c0ef0dd542b9a568e70c940a4d4ee6cab2c78b38ac7e6325e0ebfa78
-
SHA512
8bb08b06f46d93e4d71af6a0358caf47cbe3c8e48f75d0bbfef76edcd5e0f3756c360704c5eb33d8d0ee17bcbdfccd79a7621fa0b18993982ca47e1ac0c41524
-
SSDEEP
6144:QHSGgGFZ2aP/FCzZa82M9RSxgQ4QmiFIwTGrdL/hHqdH:QEAcaPIzZBRS2QRmiZarkdH
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Gonzo's Public Hook.dll unpack001/Gonzo's Public Hook.exe
Files
-
ae0f1b3153590211fad50e422b07a903_JaffaCakes118.rar
-
Gonzo's Public Hook.dll.dll windows:5 windows x86 arch:x86
c2ad5ad2fbb61f5ea957064b0fcb0aec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
InterlockedExchange
GetCurrentProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
CreateThread
CloseHandle
VirtualProtect
GetModuleHandleA
VirtualAlloc
GetPrivateProfileIntA
MulDiv
Sleep
GetVolumeInformationA
ExitProcess
GetModuleFileNameA
DisableThreadLibraryCalls
GetCurrentThreadId
GetTickCount
OutputDebugStringA
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
InterlockedCompareExchange
user32
GetSystemMetrics
mouse_event
GetAsyncKeyState
keybd_event
SetCursorPos
gdi32
CreateDIBSection
CreateFontA
GetDeviceCaps
SetBkColor
DeleteObject
DeleteDC
CreateCompatibleDC
SetMapMode
SetTextAlign
ExtTextOutA
SetTextColor
GetTextExtentPoint32A
SelectObject
shell32
ShellExecuteA
msvcr90
_except_handler4_common
_crt_debugger_hook
_ftol
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_encoded_null
free
_malloc_crt
_decode_pointer
_onexit
_lock
_encode_pointer
_finite
_unlock
__CxxFrameHandler
__clean_type_info_names_internal
_CIacos
_time64
_localtime64
ceil
??2@YAPAXI@Z
??3@YAXPAX@Z
strncpy
??_U@YAPAXI@Z
sprintf
_vsnprintf
__CxxFrameHandler3
__dllonexit
memset
msvcp90
??0?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?open@?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXPBDHH@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEXXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEXXZ
?uncaught_exception@std@@YA_NXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHPBDH@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
wininet
InternetReadFile
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
Sections
_TEXT Size: 512B - Virtual size: 431B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Gonzo's Public Hook.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\Documents and Settings\Xp\Belgelerim\Visual Studio 2008\Projects\MewtaZaKKon\MewtaZaKKon\obj\Debug\MewtaZaKKon.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 512B - Virtual size: 170B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 363KB - Virtual size: 363KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Gonzo's Public Hook.txt