?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
ac126655a16cb24990907ec774657454_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ac126655a16cb24990907ec774657454_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ac126655a16cb24990907ec774657454_JaffaCakes118
Size
13KB
MD5
ac126655a16cb24990907ec774657454
SHA1
8cfd39603bad2ac285d498de22786e3ee736ccef
SHA256
3baeaf72aa86db8e9a4c99680fbccbaf1395d13ee5e4aa9a9287eec4002dbfff
SHA512
676b79726b071db76a69d0e846cf6f600b720b99f781b9c94378a94255afe51e524af33b30084564161a5ae3b0b11452573c9d098a361af1646231d865aff13a
SSDEEP
192:SaRUEwvKhLCdRRfswTP3AdaezwwOSJZNf8PxrRqTpWJrHplXSjj:SaR9yRPfPSF8PxrRqTpWhHp
Checks for missing Authenticode signature.
resource |
---|
ac126655a16cb24990907ec774657454_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ord5302
??1type_info@@UAE@XZ
CallNextHookEx
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE