DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
046d086a907d0f8366e8bec174682eca_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
046d086a907d0f8366e8bec174682eca_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
046d086a907d0f8366e8bec174682eca_JaffaCakes118
Size
158KB
MD5
046d086a907d0f8366e8bec174682eca
SHA1
01f772d5a74421105fe0914070a45fca53fbb2cd
SHA256
a41680c4b08d62880afb2560413f6aa38479878143e6a12ce471b22950454095
SHA512
0ac42413122d1719b467fff2adbc137db9dc1d1473ba5806119657730af4359b67919a7507ab446f5f0703e532856eefa499f315f66a32c99feafc62e639bcb7
SSDEEP
3072:P516yfk16TvFplR04fDdTBoAQFPVnZZf/Kp:R17k1YplR04fDdTBUznZZfyp
Checks for missing Authenticode signature.
resource |
---|
046d086a907d0f8366e8bec174682eca_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE