EnHookWindow
UnHookWindow
fs448547aaaa
Static task
static1
Behavioral task
behavioral1
Sample
0000c0e16d2c84f05e0cd1e420b310ab_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0000c0e16d2c84f05e0cd1e420b310ab_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
0000c0e16d2c84f05e0cd1e420b310ab_JaffaCakes118
Size
21KB
MD5
0000c0e16d2c84f05e0cd1e420b310ab
SHA1
ba95f1e407f3ce41abf5a5fd708285891f092d72
SHA256
b59240ca3b8d0fe34cb24324895447061ffe64fb75bf25446120eaaf11ba6b8c
SHA512
97729617f923afd8f6e9e15fd571bdd74a80277f6b573f1cf9a8345108a071d7e04374581f1b8ec3e22008a25c9c7768e4f5182b7a09cdad1030ed11cf15d53e
SSDEEP
384:RPyZNjtU2mC45TPZHs4FPtl205jj87zKDzEFLppP:JyZDKpFF9VmzCEFLDP
Checks for missing Authenticode signature.
resource |
---|
0000c0e16d2c84f05e0cd1e420b310ab_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
EnHookWindow
UnHookWindow
fs448547aaaa
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ