_AddPID@4
_Prog_HookAllApps@8
Static task
static1
Behavioral task
behavioral1
Sample
c0ddb356c983cf90818dd28f3203f1ad_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0ddb356c983cf90818dd28f3203f1ad_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c0ddb356c983cf90818dd28f3203f1ad_JaffaCakes118
Size
7KB
MD5
c0ddb356c983cf90818dd28f3203f1ad
SHA1
d5e9a903220234aba8f920bda0df47a7d3d5bb4a
SHA256
f8fbe5eedb189b0b3292faf966c6c35833232baa9fadaec06900d92f1dc67fbd
SHA512
25771a275c93440a839ed4751d3eb67ad41e3522bebfb1232cd9355a47715359d735db73a066fe4630e61fb62569642b94d174e1b05d9a1a197279c07109cdce
SSDEEP
96:v0tFaW+RI352GJfNWzaXCa0gvakhuGZFV61AFS6ANcI5kWM:cvaWF35lJFWzaXPtCgvFnAIW
Checks for missing Authenticode signature.
resource |
---|
c0ddb356c983cf90818dd28f3203f1ad_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_adjust_fdiv
malloc
_initterm
free
_onexit
__dllonexit
wcscmp
wcsstr
strstr
DisableThreadLibraryCalls
VirtualQuery
LoadLibraryExW
GetCurrentProcess
LoadLibraryW
Module32First
lstrcmpiA
GetProcAddress
LoadLibraryA
GetSystemInfo
GetModuleHandleA
LoadLibraryExA
WriteProcessMemory
CreateToolhelp32Snapshot
Module32Next
CloseHandle
GetCurrentProcessId
VirtualProtect
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
ImageDirectoryEntryToData
_AddPID@4
_Prog_HookAllApps@8
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ