InstallHOOK
UninstallHOOK
Static task
static1
Behavioral task
behavioral1
Sample
fc06cca9d9595d199e78d61f212d29c2_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc06cca9d9595d199e78d61f212d29c2_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
fc06cca9d9595d199e78d61f212d29c2_JaffaCakes118
Size
48KB
MD5
fc06cca9d9595d199e78d61f212d29c2
SHA1
ca6d5b283edd5f988356c7253e13feaf6345c8e8
SHA256
8f6cce7dd04183ae321371d8ef02d966822bb382f7af0e20235f6a84e21e509c
SHA512
ec7d5e403341b697673a3d33265cb93fda6fb9226bf59a0fac09a280031e8638ad69fa0b08fe153cf62fa957a5c2707c20d884542096509a58ec7e1988caba54
SSDEEP
768:lHhsanZc6VcDT3inJ9q/tMmcVf8SZAAqGxlrAADNsQo91Bzh9zQ:lBsaZTeDT3iTqumcVf8SZAAqGzAk5oH2
Checks for missing Authenticode signature.
resource |
---|
fc06cca9d9595d199e78d61f212d29c2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WinExec
Sleep
GetSystemDirectoryA
GetFileAttributesA
CompareStringW
CompareStringA
GetModuleFileNameA
LoadLibraryA
SetEnvironmentVariableA
CreateThread
HeapFree
HeapAlloc
GetLastError
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
WriteFile
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
CloseHandle
ReadFile
GetFullPathNameA
GetCurrentDirectoryA
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetFilePointer
SetStdHandle
FlushFileBuffers
CreateFileA
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetTimeZoneInformation
InterlockedDecrement
InterlockedIncrement
GetProcAddress
SetEndOfFile
GetStringTypeA
GetStringTypeW
RtlUnwind
UnhookWindowsHookEx
SetWindowsHookExA
FindWindowA
CallNextHookEx
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
InstallHOOK
UninstallHOOK
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ