?DelHook2@@YGHXZ
?SetHook2@@YGHXZ
Static task
static1
Behavioral task
behavioral1
Sample
fdb1888707b039b9b0ea160817103ebd_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdb1888707b039b9b0ea160817103ebd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
fdb1888707b039b9b0ea160817103ebd_JaffaCakes118
Size
14KB
MD5
fdb1888707b039b9b0ea160817103ebd
SHA1
c3ef02331ff87045d986653027f086a7966171e9
SHA256
28a90ab528673547ee8604b97614d215004d442dbc23c9aa884765d5f87b2039
SHA512
d544f57b1ecf22324a0b54c4b21457635bafe517bb5932e4a9c0658056fd3e892c133da93f5514b8c681386c4d25b857d84f9dc2929c8021006efdf02e12c5e4
SSDEEP
192:Bavkb008ywQuRLCLrXwLCImdzbJkRyDL9ZhlTpWJWEDFXUbxx5:BW0J3LrXwLGJkuzlTpWsaFXUN
Checks for missing Authenticode signature.
resource |
---|
fdb1888707b039b9b0ea160817103ebd_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
StrToIntA
EnumProcessModules
ord1089
??1type_info@@UAE@XZ
GetAsyncKeyState
SHGetSpecialFolderPathA
CoInitialize
VariantClear
URLDownloadToFileA
?DelHook2@@YGHXZ
?SetHook2@@YGHXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE