HookProc
InstallHook
RemoveHook
Static task
static1
Behavioral task
behavioral1
Sample
ba1008c0aead90a263b4ec96da456fae_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba1008c0aead90a263b4ec96da456fae_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ba1008c0aead90a263b4ec96da456fae_JaffaCakes118
Size
36KB
MD5
ba1008c0aead90a263b4ec96da456fae
SHA1
7c55aa1acfbb4ccca06d0c727dc729dc048f9e7c
SHA256
0f92a0815e0339a80614300bb6163c720d695753d22d16724bb506f5c49b1c2c
SHA512
667128cda7883777e0d1d23c91692b19117ff892cb786d08418277420029a1f19283b7f5fe7bfd47ca9b074344d031fdda443deffffffc6086ef42e583f4761e
SSDEEP
384:cFqS7spWkPT5NGqu1mlWVtCMv6RyZbWwBogNoUoziGWR51B:cFNWvT5JOCRsWwBLiUol
Checks for missing Authenticode signature.
resource |
---|
ba1008c0aead90a263b4ec96da456fae_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsBadWritePtr
OutputDebugStringA
lstrcmpiA
VirtualProtect
VirtualQuery
GetVersionExA
GetModuleHandleA
WideCharToMultiByte
DisableThreadLibraryCalls
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
RtlUnwind
GetCommandLineA
GetVersion
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
GetStringTypeW
SetWindowsHookExA
CallNextHookEx
FindWindowA
GetWindowThreadProcessId
UnhookWindowsHookEx
HookProc
InstallHook
RemoveHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ