HookEnter
HookLeave
Static task
static1
Behavioral task
behavioral1
Sample
3f7874ed54108318de37928a6870c976_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3f7874ed54108318de37928a6870c976_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3f7874ed54108318de37928a6870c976_JaffaCakes118
Size
4KB
MD5
3f7874ed54108318de37928a6870c976
SHA1
8a202ced945b485b0a0fb629eaa3f2034c5bcbcb
SHA256
d86517635d398a3fd66b246a8847a033e7a97ab2cfe59ee0fd11b70b9cc1a97f
SHA512
2268c8ba1916b55bb16518ae7b3863c0f07c640d8542afaecb69db957cf5f29327948f4294c031258c1a4bc9bf99e33ebf056335ee36960b78720f1336192239
SSDEEP
48:qSBLnAOpLg806f4hbtxXKlLzXZ3RJ03g:O6wzx6lLzJhCg
Checks for missing Authenticode signature.
resource |
---|
3f7874ed54108318de37928a6870c976_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetEvent
Sleep
GetProcAddress
GetSystemDirectoryA
CloseHandle
LoadLibraryA
OpenEventA
GetModuleHandleA
lstrcmpiA
GetModuleFileNameA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
_adjust_fdiv
_beginthreadex
free
_initterm
malloc
HookEnter
HookLeave
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ