?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
a341eec94a442ac60ecb78bd1f51d0e3_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a341eec94a442ac60ecb78bd1f51d0e3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a341eec94a442ac60ecb78bd1f51d0e3_JaffaCakes118
Size
13KB
MD5
a341eec94a442ac60ecb78bd1f51d0e3
SHA1
d00be332c5cb2e6dd480983ab9b974bbdebb261d
SHA256
5cc85d51cd4124a68e5e08951c873eeb7aeccc209c49deddebe3d7bc643e2389
SHA512
b53471f7d974708243b0cdb4c9415b4e0fa11d9bdee1648ba3a7975a7bff573a8e650eaf8960810458d35a9cf2eed9f647f054f45f992412f1a47756b0366df5
SSDEEP
384:Ul8GJx3Y1h15mlSr90sMG6LTpWAYkDYFhyM:UOGHIBklSr9EZTYkYWM
Checks for missing Authenticode signature.
resource |
---|
a341eec94a442ac60ecb78bd1f51d0e3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
StrToIntA
EnumProcessModules
ord1089
??1type_info@@UAE@XZ
GetAsyncKeyState
SHGetSpecialFolderPathA
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE