??0CKeyHook@@QAE@XZ
??1CKeyHook@@UAE@XZ
??_7CKeyHook@@6B@
?Start@CKeyHook@@QAEPAUHHOOK__@@HKKVCString@@KK@Z
?Stop@CKeyHook@@QAEHXZ
Static task
static1
Behavioral task
behavioral1
Sample
94176ffcee2a8636ae60d3dc5bd00510_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
94176ffcee2a8636ae60d3dc5bd00510_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
94176ffcee2a8636ae60d3dc5bd00510_JaffaCakes118
Size
84KB
MD5
94176ffcee2a8636ae60d3dc5bd00510
SHA1
f1adbe52d3f85221361bc4b6b7b0ba309fc0c12f
SHA256
33181021ce14463f91d907551e5e647b7b327aa891e0367bb853a76a137bfa38
SHA512
8b3836a8cfb1e6d1390d38865f137457f9e72cc8c263609c6f0d3b801c516aef8bb7e77802053c152bb84b98ea917e5c836c5275c8b2e6d12d7bb4c8af724635
SSDEEP
1536:hG2lT87Z63zJ2M81H79B2eQ9/BJJuBJqv0H5dBJqS:LT8t6312Th5Ue2gTH5d
Checks for missing Authenticode signature.
resource |
---|
94176ffcee2a8636ae60d3dc5bd00510_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord1200
ord3663
ord1182
ord800
ord823
ord342
ord1253
ord1168
ord825
_initterm
malloc
_adjust_fdiv
free
_except_handler3
_mbscmp
__CxxFrameHandler
?terminate@@YAXXZ
ReadProcessMemory
OpenProcess
CloseHandle
WriteProcessMemory
FindWindowA
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
??0CKeyHook@@QAE@XZ
??1CKeyHook@@UAE@XZ
??_7CKeyHook@@6B@
?Start@CKeyHook@@QAEPAUHHOOK__@@HKKVCString@@KK@Z
?Stop@CKeyHook@@QAEHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ