EndHook
StartHook
Behavioral task
behavioral1
Sample
baa279fe578fbd6f149a817e72341c50_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
baa279fe578fbd6f149a817e72341c50_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
baa279fe578fbd6f149a817e72341c50_JaffaCakes118
Size
44KB
MD5
baa279fe578fbd6f149a817e72341c50
SHA1
49d3627e8d40fc321b4d0ace2ca383ddde97bab5
SHA256
dfcdaf37898e392387ebf3b870b1d6455c2a88c4b384dbba0d410c6da7989eb7
SHA512
2e8dcfcd786191aeb27fb1b755d4e5b76ac8831932dc2e7421718723b1736648033d8a47b7214f9d8479b37c9ba2e08d08727a5ebb2e8dcf89d506d14b82a913
SSDEEP
384:tEuzqcg9pLszBNPsi5NG2YBDTGQYWjbKu:+uzqV9pLszBP5A9iQKu
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
baa279fe578fbd6f149a817e72341c50_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetCurrentThreadId
GetStartupInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
GetSystemDirectoryA
GetKeyboardType
MessageBoxA
UnhookWindowsHookEx
SetWindowsHookExA
MessageBeep
GetWindowTextA
GetWindow
FindWindowA
CallNextHookEx
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
EndHook
StartHook
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE