InstallHook
KeyboardProc
UninstallHook
Static task
static1
Behavioral task
behavioral1
Sample
a1412ca2b2f61481cf4e68a69427b857_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a1412ca2b2f61481cf4e68a69427b857_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a1412ca2b2f61481cf4e68a69427b857_JaffaCakes118
Size
3KB
MD5
a1412ca2b2f61481cf4e68a69427b857
SHA1
618853458cf39d31f9af8036b182cf9636c0d6f8
SHA256
d7e3cfe3926f467b56cc11f11b40d64af14005c2e694ef7e69081a514c2daa56
SHA512
a9188dfb3a315bbcdc5e489159bffa133bd7598c39217fe2f3cd6c297473aaaac70410b269825217317ab625403b9175640530b9d6d32cd0bbf0c7476e0b07ca
Checks for missing Authenticode signature.
resource |
---|
a1412ca2b2f61481cf4e68a69427b857_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CallNextHookEx
GetKeyboardState
PostMessageA
SetWindowsHookExA
ToAscii
UnhookWindowsHookEx
InstallHook
KeyboardProc
UninstallHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ