MHook
MUnHook
Static task
static1
Behavioral task
behavioral1
Sample
ba0748c7ed6a0ece19d28f8625c2aabc_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba0748c7ed6a0ece19d28f8625c2aabc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ba0748c7ed6a0ece19d28f8625c2aabc_JaffaCakes118
Size
12KB
MD5
ba0748c7ed6a0ece19d28f8625c2aabc
SHA1
b4afad3229262f7b64ae74683c67b78c504416d3
SHA256
e123b5ac6322c59efcfd63a4c0b25664a8f6bf2b9e4f30096de1f9c2d77e5f28
SHA512
10f92ca2252fb9f9ffac7858054a86c8fc8e04c7ee1b98703ec2f962143c4f82e0219094e8f8ea3336a91bef04644f2dc853a9f8b1385f628f5c9568ecda6f13
SSDEEP
96:nPsZe9UYrTCVG3osOkel9M5F0szMmqZwD5w2/T/M61ugmGf:n0ZGPTCVDtrM5F0szM7ZwD5w2LU6mE
Checks for missing Authenticode signature.
resource |
---|
ba0748c7ed6a0ece19d28f8625c2aabc_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
UnhookWindowsHookEx
FindWindowExA
CallNextHookEx
SetWindowsHookExA
GetWindowTextA
GetActiveWindow
MessageBoxA
GetModuleHandleA
CreateToolhelp32Snapshot
CloseHandle
Module32Next
SetFilePointer
VirtualProtect
WriteFile
Module32First
LoadLibraryA
CreateFileA
lstrlenA
lstrcpyA
GetWindowsDirectoryA
lstrcmpA
lstrcatA
GetProcAddress
CopyFileA
InternetReadFile
StrStrA
MHook
MUnHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ