DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3cd107857103e66379332dd11db27082_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3cd107857103e66379332dd11db27082_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3cd107857103e66379332dd11db27082_JaffaCakes118
Size
121KB
MD5
3cd107857103e66379332dd11db27082
SHA1
858f6e5a4c1b6d5557fac62256d676f497b64cd5
SHA256
b21dead530993974668d1e13918512a52378f96fc1ff96eca20eb79517ad4bf7
SHA512
33bda690e9003a07258d1cd1eecd9f8ebf85f683b3aea20c7884ea7b39e88b4fcaaeeff134cbfce67854003f1cce8f56192ccba496224a915c62da730895f7be
SSDEEP
3072:mqGqooblEv11qOjTRAOlSKEpcCbVja37a9DbDn5iVZ24:1UqYlADBcC1arMfDU7X
Checks for missing Authenticode signature.
resource |
---|
3cd107857103e66379332dd11db27082_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
MessageBoxA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ