Hook
Unhook
Static task
static1
Behavioral task
behavioral1
Sample
3f439ca14148007c6a2e6fbe3bbf261d_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f439ca14148007c6a2e6fbe3bbf261d_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3f439ca14148007c6a2e6fbe3bbf261d_JaffaCakes118
Size
44KB
MD5
3f439ca14148007c6a2e6fbe3bbf261d
SHA1
7abfe6af7f8bbb8cac1486b51bcec2ea41aef619
SHA256
78bb9a9e7306dadea571e37a6374e5f0b8fb2cf494f2c8a4364620a1d61c721f
SHA512
6999f36b70b81a3098414f3fe9934f5d081b3ef7ce28e0d564d9134be117bbbb8f0703695e6bb20685951648250566ec588211e6d9b59108c0c5a911fcb172c9
SSDEEP
384:i2HaViznUnkT3teiXSv1R0bb3JTfKXj5HDELV2NUSAq0H54cSWdu+20Duz1GA615:idxat1NH3J0j5jELcUSAq0HLxdUzUHB
Checks for missing Authenticode signature.
resource |
---|
3f439ca14148007c6a2e6fbe3bbf261d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WaitForSingleObject
Sleep
DisableThreadLibraryCalls
CreateThread
GetSystemInfo
VirtualProtect
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
LoadLibraryA
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCursorPos
FindWindowA
SendMessageA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
Hook
Unhook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ