EnHookWindow
UnHookWindow
fslj423j3423
Static task
static1
Behavioral task
behavioral1
Sample
000da55e85f6d4187f0c75166426ffe4_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
000da55e85f6d4187f0c75166426ffe4_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
000da55e85f6d4187f0c75166426ffe4_JaffaCakes118
Size
26KB
MD5
000da55e85f6d4187f0c75166426ffe4
SHA1
8221a4b41cc590ffd3c92027b622c6263f0166d9
SHA256
c2c4a6d26c75356d2ef857f7222addd09d3bd85f606533a415eec546509ba3e3
SHA512
96d87f2592a17dee1dc553fefe7e54506939dea11407941eed9ef57b87e950a057fa28163216c27d0db7824e5755f302602dbcb4a913f8dae228575f1baa7446
SSDEEP
384:MidD9d6GAfwjeILYZjgs6zi0k8RCw4vlnnhG+5hKaK94ySyY+OdjARqEOAHzuUi2:5G6ekLo8R3Cpw+5aBJOpeaATuUODS
Checks for missing Authenticode signature.
resource |
---|
000da55e85f6d4187f0c75166426ffe4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
EnHookWindow
UnHookWindow
fslj423j3423
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ