DllMain
HookProc
Static task
static1
Behavioral task
behavioral1
Sample
b759f62ae689f6004f86f92c3f77b3ad_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b759f62ae689f6004f86f92c3f77b3ad_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
b759f62ae689f6004f86f92c3f77b3ad_JaffaCakes118
Size
8KB
MD5
b759f62ae689f6004f86f92c3f77b3ad
SHA1
6b66d599396ab5b0e0fb7352834a277069fdebae
SHA256
fa921b247e478b6f8570b4817ec740a62ad95cf7fcf14c265a6571cfd77abf87
SHA512
55a8fc656371f7b7fb5145136b32a38a6be56228f26e090ff3f76eea52e9c7350e5a63f0e0938c1038950cf743573758b2b591f56f049d205a0a0eb82a6019b7
SSDEEP
96:ZffphRFqx1h0OIs+gJvtYjCT9018zSTJlBLx4ZW5:1fphRA1dNt+CT9c8+bhx4E
Checks for missing Authenticode signature.
resource |
---|
b759f62ae689f6004f86f92c3f77b3ad_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
CreateThread
GetModuleFileNameA
LoadLibraryA
lstrcmpiA
PathFindFileNameA
CallNextHookEx
DllMain
HookProc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE