Data
Event
Start
Stop
Static task
static1
Behavioral task
behavioral1
Sample
48bc689a9885b29ec7273e70ee172c94_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
48bc689a9885b29ec7273e70ee172c94_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
48bc689a9885b29ec7273e70ee172c94_JaffaCakes118
Size
12KB
MD5
48bc689a9885b29ec7273e70ee172c94
SHA1
6df3833da592c0424b31c2896ab14941ff3083b6
SHA256
7236c6225eb45d6d8e40996a42c50c7119ee874dddddcd8692feed85d19b682a
SHA512
8a7014ca4b18aba59e5415ef608cedc25d95423945f5bd37bb56e0f3e01e553eae7e7a98d85d6deebdee69e78abfe569b067a4fcedbfc12655fe8e47a428c2a2
SSDEEP
192:MvopWcgJzonRu8l2MaKz6dFEgf6o/4N2esvP4fQ+qjI8JY:vA5Gng8sM2kVmesvm0IKY
Checks for missing Authenticode signature.
resource |
---|
48bc689a9885b29ec7273e70ee172c94_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
FreeLibrary
GetVersion
Sleep
GetVersionExA
GetTickCount
GetVolumeInformationA
LoadCursorA
GetCursorPos
GetClientRect
GetWindowRect
LoadImageA
GetForegroundWindow
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
PostThreadMessageA
ClientToScreen
IsWindowVisible
GetCursor
SysAllocString
Data
Event
Start
Stop
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ