SetHook
UnHook
Static task
static1
Behavioral task
behavioral1
Sample
VicModz.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
VicModz.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
vic4key.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
vic4key.dll
Resource
win10v2004-20240802-en
Target
b4b8b7d18e4871f84a5dd7de67841eab_JaffaCakes118
Size
989KB
MD5
b4b8b7d18e4871f84a5dd7de67841eab
SHA1
8e5b9f8a5b1cd33f486a3884b622b5226ac6de46
SHA256
29963ce23716aad79479d4984c068414880a593278a8ab55f1c2394aa54a7b72
SHA512
9f4390c7608d3cfe411aa84870a0a73486e9f29962e9870bfdefecfae01070fce06c9750a3aff85e86bf2b11fe8a17c7da74812ee6037a5be963ee3d61b37d29
SSDEEP
24576:X/ziQW/p4ohg/eEGs9GYlgLgQLSDkFvKILBHiqv2WPwH:XrxWm1mc9GYIbJYSLdPwH
Checks for missing Authenticode signature.
resource |
---|
unpack001/VicModz.exe |
unpack001/vic4key.dll |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
SysFreeString
RegQueryValueExA
GetKeyboardType
UnrealizeObject
SetHook
UnHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE