?DelHook@@YGHXZ
?SetHook@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
fb4404c3902fa0252cd72fdb56439144_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb4404c3902fa0252cd72fdb56439144_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
fb4404c3902fa0252cd72fdb56439144_JaffaCakes118
Size
15KB
MD5
fb4404c3902fa0252cd72fdb56439144
SHA1
1a0bc505f83501d4fd79c6356f92299daf6b9e0b
SHA256
62fb90198a5894d174bd80254018354c8b0863138b9718165dfa985315a94e49
SHA512
c76a7e8362f240a96c6937e7db32735e75965ca7cf5075bda6b195d13c34d6d296ca12a630ef824afca156bd824e31988c048f9b17f36f3a0b507bb8076be8d0
SSDEEP
384:9g5Jk4p6w20d2BS3OemaUeDZQn9TpWFXm77Q:9t1vPexUeDImXmw
Checks for missing Authenticode signature.
resource |
---|
fb4404c3902fa0252cd72fdb56439144_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ord4698
??1type_info@@UAE@XZ
CallNextHookEx
RegQueryValueExA
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook@@YGHXZ
?SetHook@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE