?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
19b809e7972b7641f2e9476809c8a60d_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
19b809e7972b7641f2e9476809c8a60d_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
19b809e7972b7641f2e9476809c8a60d_JaffaCakes118
Size
14KB
MD5
19b809e7972b7641f2e9476809c8a60d
SHA1
6a89d593d827e03ec1eb595b166987132dcbf75d
SHA256
b234dd372c4b8e9c216137eb2e480a50d91e11e2437408c51847178048e01803
SHA512
258df28e49ce7140e6042a544d8f480c2e947903af994e46509c34cf5b7a3ac2f66b687395c8cff0cee5cd3a63e0f31ab62bff0b98ee68e1049f9128201d8ada
SSDEEP
384:rPXgRtTYtazpO37TUyHiGA/uIUTpWB6jcosMkAo:kzYtJ9j3Ie3jcosMP
Checks for missing Authenticode signature.
resource |
---|
19b809e7972b7641f2e9476809c8a60d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ord5307
??1type_info@@UAE@XZ
CallNextHookEx
RegQueryValueExA
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE