?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
a8f1dad97e6af0a0589f2a8922f339d6_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a8f1dad97e6af0a0589f2a8922f339d6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a8f1dad97e6af0a0589f2a8922f339d6_JaffaCakes118
Size
13KB
MD5
a8f1dad97e6af0a0589f2a8922f339d6
SHA1
9e3fdbd57ae4e8de97498c5ec25d7387ebec5d80
SHA256
6e806d9e12606837e95fbd8d24b4b7df59332d47ee5fab63286271c948f73671
SHA512
a3381b5783d0f13db5bf7f38a720d44987e3b20538c5844299b267df8c4ec75d907ea12a4387a26cb4b2b9cbc0cba7cbff734b3581ded13a70a324ead995a8e9
SSDEEP
384:UPIKTvIvGg678xPlnU4TW3qPTpWq/YxmcT:UgKTvIeDI24y3qbp/Yx
Checks for missing Authenticode signature.
resource |
---|
a8f1dad97e6af0a0589f2a8922f339d6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
StrToIntA
EnumProcessModules
ord1089
??1type_info@@UAE@XZ
GetAsyncKeyState
SHGetSpecialFolderPathA
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE