Hookoff
Hookon
Static task
static1
Behavioral task
behavioral1
Sample
ff8bca1fb0e9e80c0f9ebd37e5fe5236_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ff8bca1fb0e9e80c0f9ebd37e5fe5236_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
ff8bca1fb0e9e80c0f9ebd37e5fe5236_JaffaCakes118
Size
13KB
MD5
ff8bca1fb0e9e80c0f9ebd37e5fe5236
SHA1
be60739c43e38b9d86c0126c7930e99eb2b91688
SHA256
c8b95f1b1750010fd4f60e02a84990dcc6a627185fa1fbb26db2131d98da5136
SHA512
40489898640cf86a55fcf70d490273ca08735463d866785f6db7d1e0320f1da063c5ea514e6a8fe0f7b21479b18240295cc36c2cb51ec81fc48487664cd64dab
SSDEEP
192:+sC2m0AVfSUYn6IWpM0ImGYzlRHzR25tX+dL+Y3vgXb6O2:h2xJpbIW3E+dF5
Checks for missing Authenticode signature.
resource |
---|
ff8bca1fb0e9e80c0f9ebd37e5fe5236_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OutputDebugStringA
VirtualProtect
Sleep
lstrcmpA
lstrcatA
lstrcmpiA
lstrcpyA
ExitProcess
lstrlenA
GetTickCount
lstrcpynA
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
WritePrivateProfileStringA
GetTempPathA
ExpandEnvironmentStringsA
GetPrivateProfileStringA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
ReadFile
SetFilePointer
CreateFileA
CreateThread
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
CallNextHookEx
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
Hookoff
Hookon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ