SetDIPSHook
startNow
Behavioral task
behavioral1
Sample
0b8010013bfd5be14c0fa00898eb5743_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b8010013bfd5be14c0fa00898eb5743_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
0b8010013bfd5be14c0fa00898eb5743_JaffaCakes118
Size
163KB
MD5
0b8010013bfd5be14c0fa00898eb5743
SHA1
d9037276d6f51a14f5638094e7a08a718510131d
SHA256
0e508c434e1721baf270fd1342cfc747b3f1f779111b9ed5497a71c8479105d8
SHA512
9762ae6549e78de9bedb882d663bdd4351c1956d26d09956d61b13960b131682e9682ebf383ab382d515b01911d887a8474d6995d2948103d861c9427d44a0f8
SSDEEP
1536:d1xnbjY9Lzr2y2z6Xe2SSf1q4Tqtwi9+ftnzl5:dbnGPiy2ullVi8Fnzl5
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
0b8010013bfd5be14c0fa00898eb5743_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Beep
DeleteFileA
GetExitCodeProcess
WaitForSingleObject
CloseHandle
CreateProcessA
GetSystemDirectoryA
GetLocalTime
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetCurrentThreadId
GetModuleFileNameA
fwrite
_beginthread
strcmp
_itoa
fopen
malloc
_initterm
_adjust_fdiv
_onexit
__dllonexit
free
fclose
memmove
_strlwr
strcat
strlen
sprintf
strcpy
memset
_splitpath
strstr
system
fread
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowLongA
IsWindow
PostThreadMessageA
CallNextHookEx
EnumChildWindows
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
EnumWindows
FindWindowA
SendMessageA
MessageBoxA
SetDIPSHook
startNow
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE