?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
3cca8c9a689ec76dbd74471b4baf71a3_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3cca8c9a689ec76dbd74471b4baf71a3_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3cca8c9a689ec76dbd74471b4baf71a3_JaffaCakes118
Size
15KB
MD5
3cca8c9a689ec76dbd74471b4baf71a3
SHA1
5665983a7754cb237ae7d962ae34d3e6ef3ea87c
SHA256
a79a1a908467510fefde12c526f8935f5d84fdb32c8030367f5b91328d248e55
SHA512
d2127a23a8d0c4ac720db73f439e18b364f5c6836e94066eba4987e6863b190cb77735b0b6c7167c262ca8e3190d201a72e9e055da228429c643859bde6821ed
SSDEEP
384:vQUxVcdPuyhCVrAWNLk8eGcbcTpW9XLHiHrH:LcdPHhYrA2QGca2XLHiz
Checks for missing Authenticode signature.
resource |
---|
3cca8c9a689ec76dbd74471b4baf71a3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ord4698
??1type_info@@UAE@XZ
CallNextHookEx
RegQueryValueExA
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE