tl_ksHook
tl_tzHook
Behavioral task
behavioral1
Sample
1353146c598262400e9160c179a8d02e_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1353146c598262400e9160c179a8d02e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
1353146c598262400e9160c179a8d02e_JaffaCakes118
Size
48KB
MD5
1353146c598262400e9160c179a8d02e
SHA1
257207eb965491f54f64d8eafc8d5c777cba481b
SHA256
5192c4ce75679ed482a6e52b201a063fa84e212336ebf0bad5decda28bed858b
SHA512
57b72bbfe1bb078d0e214f9bc74a631bdfb990d93560c3da33a561d7065c1d5c9b7f470c87a78431b4a8c9608ec3716432f74d9248750a162e76b878ec944512
SSDEEP
384:hIeqht6JKMvXAXTN7GIB850LuVFZjUPp9OnCFBS5rRqQc0YfrBzxM4witMQemKTV:It64+XAd82sFXAUl+xMffufg7
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
1353146c598262400e9160c179a8d02e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
WriteProcessMemory
WinExec
VirtualProtectEx
VirtualFree
VirtualAlloc
UnmapViewOfFile
TerminateProcess
Sleep
SetSystemTime
SetFilePointer
ReadProcessMemory
ReadFile
OpenProcess
OpenFileMappingA
MoveFileExA
MapViewOfFile
LoadLibraryA
GlobalFindAtomA
GetWindowsDirectoryA
GetThreadLocale
GetTempPathA
GetSystemTime
GetStdHandle
GetProcessHeap
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLastError
GetCurrentProcess
GetComputerNameA
FindFirstFileA
FindClose
DeleteFileA
CreateThread
CreateProcessA
CreateMutexA
CreateFileA
CompareStringA
CloseHandle
GetCurrentThreadId
ExitProcess
UnhandledExceptionFilter
RtlUnwind
RaiseException
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
FreeLibrary
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
RegSetValueExA
RegSaveKeyA
RegRestoreKeyA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
URLDownloadToFileA
UnhookWindowsHookEx
ShowWindow
SetWindowsHookExA
SetThreadDesktop
SendMessageA
PostThreadMessageA
IsWindow
IsMenu
IsDlgButtonChecked
GetWindowThreadProcessId
GetWindowRgn
GetMessageA
GetMenuState
GetInputState
GetForegroundWindow
GetDlgItem
GetClassNameA
GetCaretBlinkTime
FindWindowExA
FindWindowA
CreateDesktopA
CloseDesktop
CallNextHookEx
timeKillEvent
timeSetEvent
WSACleanup
WSAStartup
gethostbyname
socket
send
recv
htons
connect
closesocket
tl_ksHook
tl_tzHook
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE