?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
f6acea5917d9352e1b17e9af3e23c03b_JaffaCakes118.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f6acea5917d9352e1b17e9af3e23c03b_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f6acea5917d9352e1b17e9af3e23c03b_JaffaCakes118
Size
15KB
MD5
f6acea5917d9352e1b17e9af3e23c03b
SHA1
7722854534963df1b5a06dab2907f8828a56c062
SHA256
15505624d3e5dcbcb28c1773bcc0446a36e1ced5160f6573bfcc9a73ecccd558
SHA512
791d786b9c7cd0aab1734317dc645165ce821bc7793be5223425b04b88d2d391a5fa531e70c1232c5910b096e333d69c0b63984f9848ec13f43625526d17c7b8
SSDEEP
384:8gxKwOVvz65yUs7AZ3p7SMhehQkeujXTpWGXm1e1U:8lPVrVUsop7h8dH5Xm1e1U
Checks for missing Authenticode signature.
resource |
---|
f6acea5917d9352e1b17e9af3e23c03b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ord4698
??1type_info@@UAE@XZ
CallNextHookEx
RegQueryValueExA
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE