?UnHook@@YAHXZ
KeyboardProc
installhook
Static task
static1
Behavioral task
behavioral1
Sample
f426fca0b09560e328b0798002788611_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f426fca0b09560e328b0798002788611_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f426fca0b09560e328b0798002788611_JaffaCakes118
Size
76KB
MD5
f426fca0b09560e328b0798002788611
SHA1
e7688372db6b07f78d0e529c4b310468aeee2ffd
SHA256
a9a479f5a2a58a1a6253579a8681685b2d34feb2c4c8720c6e7743eb7aba079a
SHA512
b7112e231816e2df0bd4096e2c05f62939848f0af107451b31029987113f02e7c86faf025f5a8cc02ab325ce309cbd7519a5843ad9b0f67597b64a418d91f081
SSDEEP
768:WRFQxzmMP7RLt+vgu7rkZS+kCnYRO6gq3lRAdbzH4S3LafYWPNmuSo57xzzB:WRKxBDhZNkAo3lRAdbT4Sbaf3M/oBx
Checks for missing Authenticode signature.
resource |
---|
f426fca0b09560e328b0798002788611_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteCriticalSection
GetLocalTime
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetLastError
CloseHandle
InitializeCriticalSection
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapReAlloc
VirtualAlloc
SetStdHandle
FlushFileBuffers
SetFilePointer
CreateFileA
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
SetEndOfFile
ReadFile
LCMapStringA
LCMapStringW
RtlUnwind
UnhookWindowsHookEx
wsprintfA
SetWindowsHookExA
GetKeyboardState
ToAscii
CallNextHookEx
?UnHook@@YAHXZ
KeyboardProc
installhook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ