?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
331f766e5c65411c6a768c4734595710_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
331f766e5c65411c6a768c4734595710_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
331f766e5c65411c6a768c4734595710_JaffaCakes118
Size
15KB
MD5
331f766e5c65411c6a768c4734595710
SHA1
35e723da48a00d617348f72bd87204b90a224770
SHA256
306bfcd4f4d08b5111b6433568ee2fc368deabc6516de5bd8a8db1789dd73c99
SHA512
34275204c703f738401f194bed8f89a844b7f1e359fcec4bdcbc94bd8faf56e3684ddb588e259bd3d4829a69e80c5fb8a984ee250aac2f6eea440a79fe146e83
SSDEEP
384:D9SWffq2Pe/8iepyu+LVTpWD6cQy7ILI:D9NHqkevepoL5Ncl7ILI
Checks for missing Authenticode signature.
resource |
---|
331f766e5c65411c6a768c4734595710_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ord5307
??1type_info@@UAE@XZ
CallNextHookEx
RegQueryValueExA
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE