?CCCW32_Install@@YA_NXZ
?CCCW32_UnInstall@@YA_NXZ
Static task
static1
Behavioral task
behavioral1
Sample
4182b1186875506f5ba72c99ee2d3ec5_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4182b1186875506f5ba72c99ee2d3ec5_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
4182b1186875506f5ba72c99ee2d3ec5_JaffaCakes118
Size
36KB
MD5
4182b1186875506f5ba72c99ee2d3ec5
SHA1
c385036d0e023ac9a90258af01c74f182b8ed38d
SHA256
6dc41d7eeafe5e70632afb4cc2bdbc157292b85dc80c99b825abc04f220419c2
SHA512
0a6e4e2f0710c8eaf0291071ad757c026ff22218a2831075aae76de83f2a332bda87f93af5ab3daaf125e377f17b8847fbd84591f285d92950ad8ec834fc5810
SSDEEP
384:aAUXv5sMOIt6L+frFvHEGL0qNTcdTs81H832Vc:aBv5sMOIt6L2cqFQR1H8R
Checks for missing Authenticode signature.
resource |
---|
4182b1186875506f5ba72c99ee2d3ec5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentThreadId
IsWindowEnabled
GetSystemMetrics
GetWindowDC
EnableWindow
CallWindowProcA
ClientToScreen
GetScrollInfo
IsWindow
GetWindow
GetDlgItem
GetParent
GetFocus
GetWindowRect
PtInRect
GetCapture
KillTimer
SetTimer
DefWindowProcA
GetClassNameA
SetWindowLongA
CallNextHookEx
InvalidateRect
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowLongA
GetDC
GetClientRect
GetSysColor
ReleaseDC
GetSysColorBrush
FillRect
SendMessageA
RedrawWindow
GetCursorPos
IntersectRect
SaveDC
MoveToEx
CreateSolidBrush
Rectangle
GetStockObject
DeleteObject
ExcludeClipRect
LineTo
RestoreDC
CreatePen
SelectObject
Arc
SelectClipRgn
_adjust_fdiv
malloc
_initterm
free
_onexit
__dllonexit
_ftol
_mbsicmp
??2@YAPAXI@Z
??3@YAXPAX@Z
?CCCW32_Install@@YA_NXZ
?CCCW32_UnInstall@@YA_NXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ