HookDone
HookInit
Static task
static1
Behavioral task
behavioral1
Sample
b6d1dd5288924a8342156be399ca39c8_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b6d1dd5288924a8342156be399ca39c8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b6d1dd5288924a8342156be399ca39c8_JaffaCakes118
Size
4KB
MD5
b6d1dd5288924a8342156be399ca39c8
SHA1
d47e48a61ca2b6c782c3e324051a4f66c28bde46
SHA256
abb2fb5b180d64fba2791f12b817432b8b3be62bd51ccbeb4217267359f4ed2e
SHA512
0ff5adf782faa4be42f83122469c96382f153f0407c72f022e6497fecfa06e4580f7aec1ad2e70159477e7ffabdf92ea211a7edc1845facf538559c7c512fb0f
SSDEEP
48:qt9+3fYnnJvGzcgW4yvKif0Oogn9fyc9q:20wnpwcgxpSHo6fyck
Checks for missing Authenticode signature.
resource |
---|
b6d1dd5288924a8342156be399ca39c8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
lstrcmpA
lstrlenA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
CharUpperBuffA
HookDone
HookInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ