installhook
removehook
Static task
static1
Behavioral task
behavioral1
Sample
4054e5f04959fa71fa0d7727e261119c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4054e5f04959fa71fa0d7727e261119c_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
4054e5f04959fa71fa0d7727e261119c_JaffaCakes118
Size
7KB
MD5
4054e5f04959fa71fa0d7727e261119c
SHA1
6a4d1417e44d5bd8dec212296bea6b7faae68319
SHA256
ee7c193cc08fc8937dfd8b048dfd269ab087a65cd293593c0e431ba9c1f82ba8
SHA512
fe8fd21c5ce4fc1ad8451ccfff9ae38836fc5b3ff4068f61f990a970c22b879f6fd5a5d281383dab299b4810928731787e2aeb8e6ebbd5c129eed7c282315cb7
SSDEEP
96:CLlW5mC/3bhDfuXm8TIan9Ou0a/qKHofKQD43G19EvEW4:CRTq3JfuXnd9OuVAKHvE9
Checks for missing Authenticode signature.
resource |
---|
4054e5f04959fa71fa0d7727e261119c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TerminateThread
CreateThread
GetModuleFileNameA
CloseHandle
ReleaseMutex
WaitForSingleObject
SetThreadPriority
GetCurrentThread
CreateMutexA
WriteFile
CreateFileA
DefWindowProcA
UnhookWindowsHookEx
CallNextHookEx
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
CreateWindowExA
PostMessageA
SendMessageA
RegisterClassExA
SetWindowsHookExA
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetSetCookieA
InternetOpenA
InternetConnectA
HttpQueryInfoA
_adjust_fdiv
_initterm
_onexit
__dllonexit
malloc
memset
_atoi64
strcpy
strlen
??2@YAPAXI@Z
realloc
memcpy
_itoa
free
??3@YAXPAX@Z
_strlwr
strstr
installhook
removehook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ