GetNewIEHand
GetNewIESHand
SaveIEProcessID
SetTaskNum
installhook
uninstallhook
Static task
static1
Behavioral task
behavioral1
Sample
e0d4df17850629a35247c27d54dfe478_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0d4df17850629a35247c27d54dfe478_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
e0d4df17850629a35247c27d54dfe478_JaffaCakes118
Size
48KB
MD5
e0d4df17850629a35247c27d54dfe478
SHA1
b7d930b2b6b2fc4b5c0a322876ac8a7b7ac07770
SHA256
4a767469f89b12b7fd10b81e91feede385cc5c8271fe1ec44029c1b5f5ffd862
SHA512
1627c7b24e825125890ac8da6c79ce74d893bf26a7f21a12e6be148b978073ca3464167160d6b616ea7f5ab59c5424b407dec109792a16139729eef11e4ebb5b
SSDEEP
768:dfc8hTwgs15rI+VF3/DJV7FoUBLzkYTxKJZ9X7:y8hTwgs15r133FhFoAzo79
Checks for missing Authenticode signature.
resource |
---|
e0d4df17850629a35247c27d54dfe478_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OpenMutexA
GetProcAddress
GetModuleHandleA
lstrcmpiA
CloseHandle
RtlUnwind
FlushFileBuffers
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetClassNameA
GetWindowThreadProcessId
CallNextHookEx
SetParent
SetWindowPos
GetWindowLongA
SetWindowLongA
UnhookWindowsHookEx
RegisterClassExA
CreateWindowExA
DefWindowProcA
SetWindowsHookExA
GetNewIEHand
GetNewIESHand
SaveIEProcessID
SetTaskNum
installhook
uninstallhook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ