DeleteTWHook
SetHookOptions
SetTWHook2
SetTempHookOptions
SetTransparent
TW_TrackMouseEvent
Overview
overview
3Static
static
3ha_TweakWi...ok.dll
windows7-x64
3ha_TweakWi...ok.dll
windows10-2004-x64
3ha_TweakWi...in.exe
windows7-x64
3ha_TweakWi...in.exe
windows10-2004-x64
3ha_TweakWi...ow.chm
windows7-x64
1ha_TweakWi...ow.chm
windows10-2004-x64
1ha_TweakWi...��.url
windows7-x64
1ha_TweakWi...��.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
ha_TweakWindow-v1.5/TWHook.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ha_TweakWindow-v1.5/TWHook.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ha_TweakWindow-v1.5/TweakWin.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ha_TweakWindow-v1.5/TweakWin.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
ha_TweakWindow-v1.5/TweakWindow.chm
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ha_TweakWindow-v1.5/TweakWindow.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ha_TweakWindow-v1.5/新云软件.url
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ha_TweakWindow-v1.5/新云软件.url
Resource
win10v2004-20240802-en
Target
d488f9f83678b72f3708ae346a47c553_JaffaCakes118
Size
1.2MB
MD5
d488f9f83678b72f3708ae346a47c553
SHA1
00b621b1a8ba8901d1a95d49a7a6976596d63eda
SHA256
38d48ba0f727ed74266910130b8e22c2e4c740bda1caed8570795379b692d65c
SHA512
06e809d297828c39bb8ff00ff77f4470d2576cb357b829c1f6c15bddb284a3998b3d90f5881969514fcde9982eb0b4558432ba1758f53f029617b5848f090502
SSDEEP
24576:9lsiyJh0XWB5homkNNDROSjjdYgFGfgCKyIQvtRTe8fDW6jTSlX24IxIux6:3s8XW7Zk/DRb1ZF9yD+mW6jFf8
Checks for missing Authenticode signature.
resource |
---|
unpack001/ha_TweakWindow-v1.5/TWHook.dll |
unpack001/ha_TweakWindow-v1.5/TweakWin.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InitCommonControlsEx
ord17
ImageList_ReplaceIcon
ImageList_Create
ImageList_Destroy
ShellExecuteA
DuplicateIcon
GetVersionExA
GetModuleFileNameA
GetCurrentProcessId
CloseHandle
FlushFileBuffers
GetSystemInfo
VirtualProtect
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
HeapSize
SetStdHandle
LCMapStringW
MultiByteToWideChar
LCMapStringA
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
SetFilePointer
HeapReAlloc
VirtualAlloc
GetModuleHandleA
LeaveCriticalSection
LoadLibraryA
WriteFile
UnhandledExceptionFilter
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsGetValue
TlsSetValue
TlsFree
GetLastError
SetLastError
TlsAlloc
GetCurrentProcess
TerminateProcess
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
VirtualQuery
InterlockedExchange
GetCommandLineA
GetCurrentThreadId
GetProcAddress
GetSystemTime
EnterCriticalSection
ExitProcess
RtlUnwind
GetWindowRect
SetWindowsHookExA
UnhookWindowsHookEx
FindWindowA
GetWindowTextA
SetCapture
ScreenToClient
ReleaseCapture
TrackPopupMenu
PtInRect
GetSystemMenu
RemoveMenu
GetMenuItemCount
IsWindowVisible
WindowFromPoint
SetCursorPos
EnumChildWindows
GetIconInfo
EnableMenuItem
CheckMenuItem
GetWindowDC
DrawIconEx
ReleaseDC
CallNextHookEx
OffsetRect
RegisterWindowMessageA
LoadImageA
CreatePopupMenu
AppendMenuA
DestroyMenu
GetAsyncKeyState
ShowWindow
GetCursorPos
GetSystemMetrics
SendMessageTimeoutA
InvalidateRect
SetWindowPos
GetPropA
SetWindowLongA
RemovePropA
SetPropA
RedrawWindow
PostMessageA
UpdateWindow
CreateDialogParamA
SetForegroundWindow
BringWindowToTop
GetDlgItem
SetFocus
DestroyWindow
GetParent
SetActiveWindow
EnableWindow
DestroyIcon
IsWindow
SendMessageA
GetClassLongA
EnumWindows
GetClassNameA
GetWindow
MessageBoxA
GetDesktopWindow
GetWindowLongA
GetAncestor
TrackMouseEvent
CreateSolidBrush
CreatePen
SelectObject
RoundRect
DeleteObject
CoCreateInstance
CoInitialize
CoUninitialize
DeleteTWHook
SetHookOptions
SetTWHook2
SetTempHookOptions
SetTransparent
TW_TrackMouseEvent
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE