glo_StartHook
glo_StopHook
Static task
static1
Behavioral task
behavioral1
Sample
efd239f35b59dd9ad163fd19037bbe27_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
efd239f35b59dd9ad163fd19037bbe27_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
efd239f35b59dd9ad163fd19037bbe27_JaffaCakes118
Size
96KB
MD5
efd239f35b59dd9ad163fd19037bbe27
SHA1
c8b0e9b1a2650fc1264a928dbc4ad38c9bce9fde
SHA256
c83d9491b67e25a81bcb8302fc6a0744541de382058c30097d09e94f39e5dc27
SHA512
0370bddee258cc5a823c163b02bbb6c8d33a2f4bb02078c3c270246ede7d2693e9bef6f0664f2ffdf9fe993025aed7ce1ed84eeb59b77e4a2cca6427661f3272
SSDEEP
1536:m3AzdNpxYEd0KtTIwLv6QbQc6HRxyqAGlQlQQF:mQzdNpxYEZVxN6HoGlQlQQ
Checks for missing Authenticode signature.
resource |
---|
efd239f35b59dd9ad163fd19037bbe27_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
GetProcAddress
LoadLibraryA
GetShortPathNameA
GetModuleFileNameA
MultiByteToWideChar
HeapAlloc
GetProcessHeap
GetCurrentThreadId
GetVersionExA
GetLastError
WideCharToMultiByte
HeapFree
OpenMutexA
lstrcmpiA
GetCommandLineA
HeapReAlloc
ExitProcess
SetFilePointer
GetOEMCP
GetACP
FlushFileBuffers
SetStdHandle
HeapCreate
GetEnvironmentStringsW
VirtualFree
FreeEnvironmentStringsW
RaiseException
InterlockedExchange
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetCPInfo
LCMapStringW
LCMapStringA
ReadFile
InterlockedDecrement
InterlockedIncrement
RtlUnwind
LocalFree
GetVersion
HeapDestroy
FreeEnvironmentStringsA
GetEnvironmentStrings
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
GetStringTypeA
VirtualAlloc
WriteFile
IsBadWritePtr
Sleep
TerminateProcess
GetCurrentProcess
HeapSize
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
CloseHandle
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetWindowTextA
wsprintfW
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetParent
SetWindowTextA
SetWindowTextW
SendMessageA
PostMessageA
GetWindowTextW
GetClassNameA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SHGetDesktopFolder
SHGetMalloc
SHGetSpecialFolderLocation
CoInitialize
CoUninitialize
PathAppendA
StrRetToBufA
PathFindFileNameA
PathStripPathA
PathRemoveFileSpecA
StrDupA
PathIsDirectoryW
PathFileExistsW
StrDupW
PathIsURLW
UrlApplySchemeW
InternetCrackUrlW
glo_StartHook
glo_StopHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ