DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
335f13edabd648e3b79569c10a491dd3_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
335f13edabd648e3b79569c10a491dd3_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
335f13edabd648e3b79569c10a491dd3_JaffaCakes118
Size
158KB
MD5
335f13edabd648e3b79569c10a491dd3
SHA1
6c9571f4693f4c4b633041106127b1c8c67708a7
SHA256
f7bdd48f79b80c458ff047ef594a35d81218158db0639378c52b387c0056d680
SHA512
e3f8a6206b2aa2fcb8e43881bd9103080acaa4a8e208455143a0a53f2731b3224668bd0996e714681db09e10be9efdcb28636d9bac53979fb784e67282a8da1c
SSDEEP
3072:DgwR8crfypW0Bp8aHOwY7TzWcYwg4uucRp:MwmpWupvHGzdYug
Checks for missing Authenticode signature.
resource |
---|
335f13edabd648e3b79569c10a491dd3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE