?HKeyboard@@3PAUHHOOK__@@A
?Procedure@@YGJHIJ@Z
Static task
static1
Behavioral task
behavioral1
Sample
45fab26b4286c3a3d252ee97ae7ad1cb_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45fab26b4286c3a3d252ee97ae7ad1cb_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
45fab26b4286c3a3d252ee97ae7ad1cb_JaffaCakes118
Size
28KB
MD5
45fab26b4286c3a3d252ee97ae7ad1cb
SHA1
eec022289f90adfd1274ec2848f8277180a6ae85
SHA256
0e2a4c7ec1952a3049bbc5eda66d00a3ace4e4294927e995df7ebc3b176b95e4
SHA512
f44b97a437812a5907d690dbb51d50c2fbd0cb4de5ca5ba40694f7c7f780036d52574c9c4d8be71a921a83436096dfe05e70b6f48122bb06d84c6ad3600904cf
SSDEEP
384:YwU/2ypyCgTzPmUco5u+YmlnQFyVLG7IG6KoIo9+va64Q:s6CgTz/cyu+EFjyHIo9+r
Checks for missing Authenticode signature.
resource |
---|
45fab26b4286c3a3d252ee97ae7ad1cb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
UnmapViewOfFile
OpenEventA
MapViewOfFile
OpenFileMappingA
SetEvent
FlushViewOfFile
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
RtlUnwind
GetWindowTextA
GetForegroundWindow
CallNextHookEx
GetParent
?HKeyboard@@3PAUHHOOK__@@A
?Procedure@@YGJHIJ@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ