InstallHOOK
UninstallHOOK
Static task
static1
Behavioral task
behavioral1
Sample
e0958389dc9994551640965bed235d35_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0958389dc9994551640965bed235d35_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
e0958389dc9994551640965bed235d35_JaffaCakes118
Size
48KB
MD5
e0958389dc9994551640965bed235d35
SHA1
12635aac3b991016a94b3fecec20fd1d33bc69db
SHA256
77c834af98c2f03046f4380bddd73d6ce642daf664a28c34e99d1cdec21c69c1
SHA512
1deb22cef6969fcaa023b341d5422aabec33f21af89c953a2824a01a52f776076fd59594ead988d85e30ffc8bb8161e02070837048b2f09b7ffed76459ef79f0
SSDEEP
768:KHhsTHZc6VcDT3inJ9W/tnmcVf8SZAhGxErAAjNsQo9Nz8:KBsT5TeDT3iTW9mcVf8SZAhGsAc5ofY
Checks for missing Authenticode signature.
resource |
---|
e0958389dc9994551640965bed235d35_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WinExec
Sleep
GetSystemDirectoryA
GetFileAttributesA
CompareStringW
CompareStringA
GetModuleFileNameA
LoadLibraryA
SetEnvironmentVariableA
CreateThread
HeapFree
HeapAlloc
GetLastError
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
WriteFile
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
CloseHandle
ReadFile
GetFullPathNameA
GetCurrentDirectoryA
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetFilePointer
SetStdHandle
FlushFileBuffers
CreateFileA
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetTimeZoneInformation
InterlockedDecrement
InterlockedIncrement
GetProcAddress
SetEndOfFile
GetStringTypeA
GetStringTypeW
RtlUnwind
UnhookWindowsHookEx
SetWindowsHookExA
FindWindowA
CallNextHookEx
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
InstallHOOK
UninstallHOOK
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ