UnHookkb
installhook
installhook1
Static task
static1
Behavioral task
behavioral1
Sample
6a6244baf5b2fdb24c86499c55f06bda_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6a6244baf5b2fdb24c86499c55f06bda_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
6a6244baf5b2fdb24c86499c55f06bda_JaffaCakes118
Size
40KB
MD5
6a6244baf5b2fdb24c86499c55f06bda
SHA1
43c59d6e89435f98bcfd5661ffa2f70603da8bc6
SHA256
3c2b83b8b2ead87f9463189c0404e5ed50f0bbde2bfd0c4d914a0591eb150da4
SHA512
9378afa0aba6f13a21f888549bfa666777b74fd39c40224f5feab3047deef435caab1344073c74d8410542256a1d5706e4ff7c0d7bffed9701304a38324ef8b8
SSDEEP
768:h3SG+M0TMz8ntBiTp/MMCooJ7Bcxoc7Xj:l0TY8ntBWWMClPcjj
Checks for missing Authenticode signature.
resource |
---|
6a6244baf5b2fdb24c86499c55f06bda_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
GetSystemDirectoryA
lstrcpyA
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
lstrcatA
SetFilePointer
CloseHandle
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
RtlUnwind
SetWindowsHookExA
UnhookWindowsHookEx
ToAscii
CallNextHookEx
GetKeyboardState
UnHookkb
installhook
installhook1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ