InstallHook
UninstallHook
Static task
static1
Behavioral task
behavioral1
Sample
38fe0c92dfb25799345d41973f511df2_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
38fe0c92dfb25799345d41973f511df2_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
38fe0c92dfb25799345d41973f511df2_JaffaCakes118
Size
52KB
MD5
38fe0c92dfb25799345d41973f511df2
SHA1
7337576b1282fec127edd3cd5d38cd488bea7f83
SHA256
54ff5416c7d773336a49e418ca70be164bd384e8af001c2f94429734f1d34757
SHA512
2cca191d0787c333a6dda7412c8705c06bd09e0830aeb7dd611153215182b2180b9aed6514736f4959e85f76dfd031847857b77012875d4ccc210479636d8180
SSDEEP
1536:m38sMM3uhM4qG7CxAWdk4ULWVy5j4DrDqI:/sMM3EYd+jj4DrDv
Checks for missing Authenticode signature.
resource |
---|
38fe0c92dfb25799345d41973f511df2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersion
GetLocalTime
ReadProcessMemory
WriteProcessMemory
VirtualProtectEx
Sleep
CreateThread
GetCurrentProcess
GetCurrentProcessId
GetSystemInfo
VirtualProtect
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
GetVersionExA
HeapReAlloc
HeapAlloc
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
HeapSize
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
LoadLibraryA
SetStdHandle
QueryPerformanceCounter
GetTickCount
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
FindWindowA
GetWindowTextA
inet_ntoa
gethostbyname
WSAStartup
gethostname
WSACleanup
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetCloseHandle
InternetReadFile
InstallHook
UninstallHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ