��װ���̹���
ж�ؼ��̹���
Static task
static1
Behavioral task
behavioral1
Sample
3992f8fcb400463a856b1d563f32c11d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3992f8fcb400463a856b1d563f32c11d_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3992f8fcb400463a856b1d563f32c11d_JaffaCakes118
Size
24KB
MD5
3992f8fcb400463a856b1d563f32c11d
SHA1
3a3e72c3b2891f4599255582ff08e0f6d07aa042
SHA256
983bd496ce65466adc4e2ea8516cd637bb396bd7e7e87f04fb27529177f6784b
SHA512
46260acf24a305be86413ca2eb4c62bddbe1eea43915a909bcb46d621550e954f1303a463bd68163b7c878b3cf542f7e67518e8cfe13485aa1fd71a2fb489b40
SSDEEP
96:nBC6Y1lEhTn9tuLKa8aOUAR9NCtmJf5JULZy:nBk1lI9UjJWR9RXGL
Checks for missing Authenticode signature.
resource |
---|
3992f8fcb400463a856b1d563f32c11d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
free
_adjust_fdiv
malloc
_initterm
HeapAlloc
IsBadReadPtr
HeapFree
ExitProcess
GetProcessHeap
RtlMoveMemory
GetModuleHandleA
SetWindowsHookExA
CallNextHookEx
MessageBoxA
wsprintfA
UnhookWindowsHookEx
��װ���̹���
ж�ؼ��̹���
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ