EnHookWindow
UnHookWindow
aaaabbbbcccc
Static task
static1
Behavioral task
behavioral1
Sample
000df2ca85024d0b43d51ac002a3f744_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
000df2ca85024d0b43d51ac002a3f744_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
000df2ca85024d0b43d51ac002a3f744_JaffaCakes118
Size
23KB
MD5
000df2ca85024d0b43d51ac002a3f744
SHA1
d0995bfc83c23bc69b0602fe495687b5b5efe495
SHA256
f0224d033955896f123481b27a0701894b6f20b97cc4747730fd064080295fc1
SHA512
d56f522c027c4bcbb7e14754bd163b0c57cb96ba294ee08455555e801da1c8c006f92c8aa704e656f7d3cb2b0898657368e55ac55e8bbaacab5d44180671c64b
SSDEEP
384:/yVlNjtU2eGg45LX0RLbcMYB6+h4N8/rNFu6OLthHgED+ezEZy2mP9:6VlmiavyB6oN0fphHF+OEZyj
Checks for missing Authenticode signature.
resource |
---|
000df2ca85024d0b43d51ac002a3f744_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
EnHookWindow
UnHookWindow
aaaabbbbcccc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ