??0CHook@@QAE@XZ
??4CHook@@QAEAAV0@ABV0@@Z
?exitHook@@YAXPAUHHOOK__@@@Z
?initHook@@YAPAUHHOOK__@@XZ
?setKbHook@@YAXHH@Z
?setMouseHook@@YAXHH@Z
Static task
static1
Behavioral task
behavioral1
Sample
e1f359377182955fe3ebdaa8d4799e39_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1f359377182955fe3ebdaa8d4799e39_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
e1f359377182955fe3ebdaa8d4799e39_JaffaCakes118
Size
48KB
MD5
e1f359377182955fe3ebdaa8d4799e39
SHA1
8794f09f6f3198d27d65d626d9c34d2e5388a505
SHA256
977c45c4e9f4b459383d9f535ad7395ac8bcb6377e9e7a0cf8c130df42d1bf63
SHA512
868913ee686494b05a215e0b8d77be3cb25e57f9bffaf0080d27f8be12732ce41c1653a26cb37b4daac63d3769e484e0ebc86311fd58e63d848b7ecc5101d553
SSDEEP
384:7GtfkPiTfpKvZdNCqatXJRsML73+sMPR3Dy4P5BhDu7+4H5KvJKrtQa62XoC:7FaTxKb0RRsML6FDj5BhD8uJKj6R
Checks for missing Authenticode signature.
resource |
---|
e1f359377182955fe3ebdaa8d4799e39_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
RtlUnwind
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
SetWindowsHookExA
GetCursor
PostMessageA
CallNextHookEx
UnhookWindowsHookEx
??0CHook@@QAE@XZ
??4CHook@@QAEAAV0@ABV0@@Z
?exitHook@@YAXPAUHHOOK__@@@Z
?initHook@@YAPAUHHOOK__@@XZ
?setKbHook@@YAXHH@Z
?setMouseHook@@YAXHH@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ