?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
4998dd3d23d0d84766f7b60630b32485_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4998dd3d23d0d84766f7b60630b32485_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4998dd3d23d0d84766f7b60630b32485_JaffaCakes118
Size
13KB
MD5
4998dd3d23d0d84766f7b60630b32485
SHA1
572786c9d4940c00d33b8b164976269d1e20bf95
SHA256
643f3e5fb6f2033005946c986b05e5267c252cc7d9f91114e94b7c295adf1425
SHA512
14cd42afe697a0cc49197f55863498b6245a25d39786bbb976a472b70caa048aac0d7cb55293a2d35c674418682fb1ae86579999a352634a93a36679bde46c14
SSDEEP
384:SALAWm3yncHUPoe6BOCtQVTpWNHDIsGg:SAEd3sGe6BOf5WHDI
Checks for missing Authenticode signature.
resource |
---|
4998dd3d23d0d84766f7b60630b32485_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ord5302
??1type_info@@UAE@XZ
CallNextHookEx
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE