DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
41ee63c440950486d8c71f185460d06b_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
41ee63c440950486d8c71f185460d06b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
41ee63c440950486d8c71f185460d06b_JaffaCakes118
Size
63KB
MD5
41ee63c440950486d8c71f185460d06b
SHA1
e49f2f537edc0538d5d7cf872e68012daadb88ff
SHA256
30295c332ac15d4f3dd21ef55442e7edd7ddd72fec5ee21395d032fd530d64ee
SHA512
3363b90a6c203d0a3861f46ec7ad7c93207edf0fab9ebc847944a8e472e269123fa553899af62fe9935d3432741152d170b80de297fc4af39406e29e3f7415ac
SSDEEP
1536:mObhfuYeeN6hMrU/KDFfuWEyI7UIrU3RPyv24:mObhMZhMaoFfusgUD3Rr
Checks for missing Authenticode signature.
resource |
---|
41ee63c440950486d8c71f185460d06b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE