GetLastTickCount
Load
RemoveHook
SetHook
SetOpt
Static task
static1
Behavioral task
behavioral1
Sample
ade69012c36f4d272716464bc105207c_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ade69012c36f4d272716464bc105207c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ade69012c36f4d272716464bc105207c_JaffaCakes118
Size
48KB
MD5
ade69012c36f4d272716464bc105207c
SHA1
5d8ce65145f0bde31fbc82f4ae2430845396a05c
SHA256
d7224777b5ac61844585f254624476da7c48b9ee157cc694b6d00f60e2531df5
SHA512
a241ad16a5506a7f8929c18fa90b2dcd7494977c722198a57f3ead9859f29cc9aa2ae110278b48dbd1b1d12c7fe259e79bfa22b9cb9f1ff52d90a66bae17e344
SSDEEP
768:c4/Vk9yEpxxWcqWMsXtLSa8wk+ZzsCSnIPq0sML:c4/+9yWxx9qWMsXtLt8/+Z53S0sML
Checks for missing Authenticode signature.
resource |
---|
ade69012c36f4d272716464bc105207c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetProcAddress
WriteProcessMemory
GetCurrentProcess
LoadLibraryA
LoadLibraryW
LoadLibraryExA
LoadLibraryExW
GetModuleHandleA
GetSystemInfo
lstrlenA
VirtualQuery
VirtualProtect
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetTickCount
lstrcmpiA
GetCurrentThreadId
TlsSetValue
GetCommandLineA
GetVersionExA
HeapReAlloc
HeapAlloc
ExitProcess
TerminateProcess
HeapSize
TlsFree
SetLastError
TlsGetValue
GetLastError
TlsAlloc
HeapFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
RtlUnwind
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
UnhookWindowsHookEx
SetWindowsHookExA
GetActiveWindow
GetForegroundWindow
SendMessageA
CallNextHookEx
ImageDirectoryEntryToData
GetLastTickCount
Load
RemoveHook
SetHook
SetOpt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ