?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
ae5f1c6236a6ce8e581cf0a8ed807dd8_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ae5f1c6236a6ce8e581cf0a8ed807dd8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ae5f1c6236a6ce8e581cf0a8ed807dd8_JaffaCakes118
Size
13KB
MD5
ae5f1c6236a6ce8e581cf0a8ed807dd8
SHA1
6504d6364c26a4669c63126b0b4860ee7bb464ec
SHA256
d3377189c3695270bd8eff695f8f56a769291fcfc92dab6879a82c15aa40bdd1
SHA512
1061aa9e2188a893ce8ede9333c79a14f54d9ce5cedc1a052db272574416d73b90d12c39e8315b0a321062b6c53158adc9e2461e181c3a1cd47c3bfab6dc7f64
SSDEEP
192:d0OC1QbzVo9UJ1lsP7LIts2XHdrk1JfnQm0sQ9TpWJxHJ+o9U3PBIhp:5eQbzmKJ1OPopdYLfQfsETpWvHJb9UJ
Checks for missing Authenticode signature.
resource |
---|
ae5f1c6236a6ce8e581cf0a8ed807dd8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ord2396
??1type_info@@UAE@XZ
CallNextHookEx
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE