COMResModuleInstance
ComeOn
SetMsgHook
Static task
static1
Behavioral task
behavioral1
Sample
f0d77d3dfff375176ca56484f881f9a7_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0d77d3dfff375176ca56484f881f9a7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
f0d77d3dfff375176ca56484f881f9a7_JaffaCakes118
Size
7KB
MD5
f0d77d3dfff375176ca56484f881f9a7
SHA1
1fb7ef59747b3fce9f7cf1c859a832e99c17eea5
SHA256
891afc90d0c637b568f2266d65d81ac77d9e780ed096ae74901472593e1bcb3b
SHA512
fbfdad25fa0c982d31b6d8ae325ec2296d5d2d492be2679e13266bc34de271f382a8d92fdf54b0076964a87dbd2bcf3465e196b2e606cdc2540711e0dfdf4c77
SSDEEP
96:GqHGFzp/RmloruBJQHbLT1oWBIXoH/VNszxN+:+lQjCRoWBI4dN67+
Checks for missing Authenticode signature.
resource |
---|
f0d77d3dfff375176ca56484f881f9a7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetWindowsDirectoryA
Process32Next
lstrcatA
FindClose
FindNextFileA
FindFirstFileA
OpenEventA
SetEvent
Sleep
GetCurrentProcessId
CreateMutexA
GetModuleFileNameA
CreateThread
ReleaseMutex
OpenProcess
CloseHandle
GetLastError
GetCurrentThreadId
LoadLibraryA
lstrcpyA
FreeLibrary
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
GetMessageA
PostThreadMessageA
CallNextHookEx
wsprintfA
EnumWindows
free
_initterm
malloc
_adjust_fdiv
strrchr
OpenProcessToken
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AdjustTokenPrivileges
LookupPrivilegeValueA
StrStrIA
COMResModuleInstance
ComeOn
SetMsgHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ