?AddHook@@YG_NK@Z
?DelHook@@YG_NXZ
?ScanPwd@@YG_NQAUHWND__@@0@Z
Static task
static1
Behavioral task
behavioral1
Sample
f3656c5de4ac74f40950dd0c9f47c7c4_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f3656c5de4ac74f40950dd0c9f47c7c4_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f3656c5de4ac74f40950dd0c9f47c7c4_JaffaCakes118
Size
7KB
MD5
f3656c5de4ac74f40950dd0c9f47c7c4
SHA1
4392ffcc0ea0f897e7951cdfcf5e1f79b3427a17
SHA256
c1a9d5b446c1376016d6bc9969850c3574937c45d465a0a0f26650d2d868ca6c
SHA512
8b7614e46f014743f8f6a9f7f884bea3162ddfe33b5cfd805db8722846edd3b78a528d296b277bad612030f30f3895e4aa4ec6f7c96378c61e32d3cd57507022
SSDEEP
192:FFK0+m/3rv56S7Ee7vbCCj08OzAUHX0GQ/jU:FFHzv56qv90ZX3OY
Checks for missing Authenticode signature.
resource |
---|
f3656c5de4ac74f40950dd0c9f47c7c4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ExitProcess
GetModuleHandleA
RegisterWindowMessageA
??3@YAXPAX@Z
?AddHook@@YG_NK@Z
?DelHook@@YG_NXZ
?ScanPwd@@YG_NQAUHWND__@@0@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE