EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
Static task
static1
Behavioral task
behavioral1
Sample
bf03ebe914f0f51a4e80f4f4b0936a08_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bf03ebe914f0f51a4e80f4f4b0936a08_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
bf03ebe914f0f51a4e80f4f4b0936a08_JaffaCakes118
Size
660KB
MD5
bf03ebe914f0f51a4e80f4f4b0936a08
SHA1
ddc08a7639c75d343224bc96e7cc072094cb2dc9
SHA256
5208ea7ca43b294de5b03573dde45ef1ea7ac575930378cc5865ef58d2879a0c
SHA512
78a1d0f257b93a96775b934df3d33126db7a7640d67041ba6e9049f5831a9ef392b94de58a8ea05a5eda0df561c44343ab86bf890c2dc18a040945d30f04336b
SSDEEP
12288:L99999999999999999999999999999999:L999999999999999999999999999999j
Checks for missing Authenticode signature.
resource |
---|
bf03ebe914f0f51a4e80f4f4b0936a08_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetWindowTextA
GetForegroundWindow
GetClassNameA
wsprintfA
lstrlenA
lstrcpynA
CloseHandle
CreateFileA
CreateThread
DisableThreadLibraryCalls
GetCurrentDirectoryA
GetCurrentProcess
GetModuleFileNameA
GetProcAddress
GetSystemDirectoryA
GlobalAlloc
IsBadReadPtr
LoadLibraryA
MultiByteToWideChar
ReadFile
RtlMoveMemory
RtlZeroMemory
SetFileAttributesA
SetFilePointer
Sleep
TerminateProcess
VirtualProtectEx
WideCharToMultiByte
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
RegQueryValueExA
EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ