JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
bddb21e96497152e97c82438605b8412_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bddb21e96497152e97c82438605b8412_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
bddb21e96497152e97c82438605b8412_JaffaCakes118
Size
24KB
MD5
bddb21e96497152e97c82438605b8412
SHA1
655bf1d111242e1431bb2585da0e4b68191acefd
SHA256
f12aae225020f7c0f2150888acf06b9619a6d6708062dce4b3bf21f50f2d4a3c
SHA512
7e082fd532201a4d05e46864edc20403a35913254d59d3d01520d7307721b04504ea7ba0e63ee9e07dc954da537338e54b2b1a115012121d30db89b2135cd37e
SSDEEP
192:xIee2D2eTCj53KEq0oX3ZAgcxdQlKB68jdJTCaaU1hziYm4GT/3a2bO:xDaeTC1Y0onZAgcxdIKB68jndaNy2K
Checks for missing Authenticode signature.
resource |
---|
bddb21e96497152e97c82438605b8412_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentProcess
GetCurrentProcessId
GetProcAddress
LoadLibraryA
CreateEventA
GlobalLock
GlobalAlloc
GetModuleHandleA
Sleep
WideCharToMultiByte
MultiByteToWideChar
VirtualProtect
VirtualProtectEx
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateThread
CreateMutexA
ReadProcessMemory
GetCurrentDirectoryA
lstrlenA
WaitForSingleObject
WriteProcessMemory
CloseHandle
SetEvent
KillTimer
wsprintfA
DefWindowProcA
SetTimer
PostQuitMessage
DestroyWindow
DispatchMessageA
PostThreadMessageA
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
LoadIconA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
GetStockObject
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
send
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
_strlwr
memcmp
memset
strcpy
strcat
fclose
fputs
fopen
strcmp
fread
memcpy
strlen
__CxxFrameHandler
??2@YAPAXI@Z
free
_initterm
malloc
_adjust_fdiv
_itoa
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ