HookOff
HookOn
Static task
static1
Behavioral task
behavioral1
Sample
eb2e49cb091a8caa6425db90005dacf7_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb2e49cb091a8caa6425db90005dacf7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
eb2e49cb091a8caa6425db90005dacf7_JaffaCakes118
Size
19KB
MD5
eb2e49cb091a8caa6425db90005dacf7
SHA1
2b3ed3c5bc8a8ea8543156e0ab1a75929bcf0be2
SHA256
26977eb79f0c3a81bf47dda6aa9c1acfe3610dd8aa31554e3eba82bdffa49334
SHA512
d7e57ccaf4b4d4911baf0fe081ea1d15be9626de1aa1d83badfcbdce6a36413fd2ff3174e6078f877b48fa58e4c834e2b0c1e44881593caf2e8ab861898c02fe
SSDEEP
384:RcZXvuCfEPW/ij7m+1IXbqB5L//T1EcvXVlogXsFsHc6r7zieqzBP:mZXPfeW/ija+1I+BXjv8geecM78B
Checks for missing Authenticode signature.
resource |
---|
eb2e49cb091a8caa6425db90005dacf7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetKeyboardType
MessageBoxA
UnhookWindowsHookEx
SetWindowsHookExW
PostMessageW
CallNextHookEx
GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetVersion
GetCurrentThreadId
VirtualQuery
GetStartupInfoA
GetCommandLineW
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
CloseHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
UnmapViewOfFile
OpenFileMappingW
MapViewOfFile
FreeLibrary
CloseHandle
HookOff
HookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ