?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
a7d020f2cf231497f000c92799278ffb_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a7d020f2cf231497f000c92799278ffb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a7d020f2cf231497f000c92799278ffb_JaffaCakes118
Size
17KB
MD5
a7d020f2cf231497f000c92799278ffb
SHA1
aca2bc9dc41bc09550c70d5e8bbe442f91cb360a
SHA256
5ee8633921030883ca9d1a74d9777f163b8edfcd425de16ca9275803a8d77983
SHA512
13f6ad21ac7a3d9add5820356a944dbc1fd02542da6048d3e6ebeff32cdb436cb5f95808a324ab25bc143dda55ee18ba65a1511eef13dcce46ebf23f34d45726
SSDEEP
384:70IvlIxAgflCubAdr4VIMQ0JR/RZ6TpWFc5MHt:IIvyGesubAdrHMhJR/P8GcE
Checks for missing Authenticode signature.
resource |
---|
a7d020f2cf231497f000c92799278ffb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ord4698
??1type_info@@UAE@XZ
CallNextHookEx
RegQueryValueExA
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE