HideProcess1
HideProcess2
Static task
static1
Behavioral task
behavioral1
Sample
83a43adc1cd0917a7ff31ce7e2b19d22_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
83a43adc1cd0917a7ff31ce7e2b19d22_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
83a43adc1cd0917a7ff31ce7e2b19d22_JaffaCakes118
Size
26KB
MD5
83a43adc1cd0917a7ff31ce7e2b19d22
SHA1
75caf40177c9b33e94b88811417a3b5731afd979
SHA256
7cbfb4032d98053d8223c43e06463a42ebd53e048f9254262d5705391535a1c4
SHA512
23c6910bb066b65ff5a8e3aac3ab50e605fd83f46b6d0bc626ab0a2d59e3faee541974c58cbaf8e3e1f7463856b4c73534dbb738990fc2ecfaebdb8c0a029890
SSDEEP
192:5dLV5Cm0TR3frTaoSbclu2dbJIPJhQ3dEP29z:vV5r0VvrTaLpE8zQ3KP0
Checks for missing Authenticode signature.
resource |
---|
83a43adc1cd0917a7ff31ce7e2b19d22_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentProcess
GetCurrentProcessId
GetModuleHandleA
GetProcAddress
CreateToolhelp32Snapshot
Module32Next
VirtualProtectEx
WriteProcessMemory
lstrcmpiA
Module32First
CloseHandle
CallNextHookEx
SetWindowsHookExA
ImageDirectoryEntryToData
HideProcess1
HideProcess2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ