MHook
MUnHook
Static task
static1
Behavioral task
behavioral1
Sample
f208749e75aba5e044f4838b57b6b0f2_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f208749e75aba5e044f4838b57b6b0f2_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f208749e75aba5e044f4838b57b6b0f2_JaffaCakes118
Size
24KB
MD5
f208749e75aba5e044f4838b57b6b0f2
SHA1
9f67160268d66234e5fe3a9965a2e2492fc8d00c
SHA256
cfff28a89281052f3f1eb283e8074a625c6847459d1fa5f0ff2eca4525ae0a8e
SHA512
3f48efa5bca1e489a41782e7d229407c90dcbc30af836842b08577c0eca0ecb200f66ecfa92d398c3dc127d6d446d5c3f5032b1bbe0a0db9c2fd2123cc94c8a4
SSDEEP
48:OEPZshp20rVy95IlkL72PtJc5bGqJI1soE4k4+246CZYAXHxd2MlZ:nPsk0Jy9XKPtCVG9sOk4+xHxcS
Checks for missing Authenticode signature.
resource |
---|
f208749e75aba5e044f4838b57b6b0f2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
CallNextHookEx
SetWindowsHookExA
MessageBoxA
FindWindowExA
GetActiveWindow
GetWindowTextA
UnhookWindowsHookEx
GetWindowsDirectoryA
GetProcAddress
CloseHandle
lstrcatA
lstrcmpA
lstrcpyA
lstrlenA
WriteFile
VirtualProtect
GetModuleHandleA
SetFilePointer
LoadLibraryA
CreateFileA
InternetReadFile
StrStrA
MHook
MUnHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ