HookProc
InstallHook
RemoveHook
Static task
static1
Behavioral task
behavioral1
Sample
cffd378d4615c949a3829b95093ce32a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cffd378d4615c949a3829b95093ce32a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
cffd378d4615c949a3829b95093ce32a_JaffaCakes118
Size
1.2MB
MD5
cffd378d4615c949a3829b95093ce32a
SHA1
75c476c7efadff0dae20b43f2bab1748c17ba1cf
SHA256
88fc8cf145baecbfa61cbd1250600f33b394443c54b974b8c865abefaad3d700
SHA512
b46933b4eaa9a19f9af830aa1d73657334bd062b7fc5deacd8bbc7d4f499eedc74b1f99cb2d55bcbb38d803871db2c26606a3c71b3084964fe55f8fdcb66f5ab
SSDEEP
1536:nqNmvT5IcAhov+etkhPwrGFBHK0o0hLxGsGOHTpJDKMmy1sND9x:nqNm6ho2eihSGFLNXT71m6sNH
Checks for missing Authenticode signature.
resource |
---|
cffd378d4615c949a3829b95093ce32a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsBadWritePtr
OutputDebugStringA
lstrcmpiA
VirtualProtect
VirtualQuery
GetVersionExA
GetModuleHandleA
WideCharToMultiByte
DisableThreadLibraryCalls
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
RtlUnwind
GetCommandLineA
GetVersion
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
GetStringTypeW
SetWindowsHookExA
CallNextHookEx
FindWindowA
GetWindowThreadProcessId
UnhookWindowsHookEx
HookProc
InstallHook
RemoveHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ