?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
059549804328102c724fb8a173593cb8_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
059549804328102c724fb8a173593cb8_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
059549804328102c724fb8a173593cb8_JaffaCakes118
Size
13KB
MD5
059549804328102c724fb8a173593cb8
SHA1
0bd8664c48079b3d106baf9d869fa894480b6286
SHA256
aaece03c20fd9284358c300633272b481905c89bec94984e51b36f55a26b60fc
SHA512
e5aeb1c7f0fa04d98b9cb992d033dc91ebdbc4e7a7097c464a9b92dbc8ac9d802921b41debde59f61584d14df8c6f55e6f4c2f29595b9d48530ad869083f12e9
SSDEEP
192:U0kVC1hf4ot2tR1SrCKqa8EfQpZGi6WNfnEdTpWJsEAQd9hU:U0bvf4PtRMeKp8Efq+WJnKTpWSlQD
Checks for missing Authenticode signature.
resource |
---|
059549804328102c724fb8a173593cb8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
StrToIntA
EnumProcessModules
ord1089
??1type_info@@UAE@XZ
GetAsyncKeyState
SHGetSpecialFolderPathA
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE