c:\r11.5-trunk\Source\Release\awhk32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1208e7843f06712ac51741ab3ece8168_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1208e7843f06712ac51741ab3ece8168_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
1208e7843f06712ac51741ab3ece8168_JaffaCakes118
-
Size
70KB
-
MD5
1208e7843f06712ac51741ab3ece8168
-
SHA1
96814be85b0ca3bc8ccd017ec0f3ab281c98ce68
-
SHA256
e936eaf8deb2f389d636fa34881bd21374d0d82ce7bb307972d5d7d0735b8480
-
SHA512
17d96843500236e7f48e2322c4a42c7fdd6006788c7d9eab877e50911409940d687960a6663dfa9706302621854352821574ae86a225409219e59434c10af4e8
-
SSDEEP
1536:m/DjTGQ8oDWv+1vCGKMvswlYiz3jhH0taGm8KcBDwiyJlHqrLB:m/koSvcCGKKswphHMr5Nciyfw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1208e7843f06712ac51741ab3ece8168_JaffaCakes118
Files
-
1208e7843f06712ac51741ab3ece8168_JaffaCakes118.dll windows:4 windows x86 arch:x86
82334e72c224c16dc4debbe5031f63b0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
shlwapi
PathFindFileNameA
kernel32
TerminateThread
WaitForSingleObject
SetEvent
WaitForMultipleObjects
CreateEventA
lstrlenA
CloseHandle
GetModuleFileNameA
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
ExitProcess
GetSystemTimeAsFileTime
GetVersionExA
DisableThreadLibraryCalls
GetTickCount
lstrcmpiA
user32
GetParent
RegisterWindowMessageA
GetSystemMetrics
IsWindow
IsWindowVisible
GetCaretPos
GetDC
ReleaseDC
GetWindowRect
GetClientRect
ClientToScreen
GetMessageA
DispatchMessageA
TranslateMessage
PostThreadMessageA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetCursor
PostMessageA
CallNextHookEx
GetCursorPos
SetCursorPos
UnhookWindowsHookEx
SetWindowsHookExA
GetUpdateRect
gdi32
GetTextMetricsA
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
msvcr70
_initterm
free
__security_error_handler
strcspn
atoi
_beginthreadex
_except_handler3
malloc
__dllonexit
_adjust_fdiv
_onexit
Exports
Exports
?CreateVideoHooks@@YGHPAUHWND__@@IIII_N@Z
?HookMouseCursor@@YGXPAPAUHICON__@@@Z
?HookMouseInstall@@YGXPAUHWND__@@II@Z
?HookMouseLock@@YGXXZ
?HookMousePos@@YGXPAK0@Z
?HookMouseQuery@@YGXPAPAUHICON__@@PAG1@Z
?HookMouseRefresh@@YGXXZ
?HookMouseRemove@@YGXXZ
?HookMouseSet@@YGXGG@Z
?HookMouseUnlock@@YGXXZ
?HookQueryInstanceHandle@@YGPAUHINSTANCE__@@XZ
?IsMouseLocked@@YGHXZ
?KillVideoHooks@@YGXXZ
?PauseVideoHooks@@YGX_N@Z
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SHARDATA Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
LLHKSHAR Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
VIDEOSHA Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1020B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ