DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
49ca57b762cf25ff72b083d1090abd99_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
49ca57b762cf25ff72b083d1090abd99_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
49ca57b762cf25ff72b083d1090abd99_JaffaCakes118
Size
26KB
MD5
49ca57b762cf25ff72b083d1090abd99
SHA1
25cdfb01e4e0686e4d891f2c87478092b944df0a
SHA256
2fe3ee6a9b5ac50ded72cf02f303342358944fb1e6abaafb7331f041d893f419
SHA512
84a2bb4e70669620942c2fc9cb8ea93bcfbb0b4b5aaaa9853946ff75f68083239154508de902c0cf294b220f020742f0a8f6a4f9f941bc5352de12b836a2d46e
SSDEEP
768:1gCKBqdSHQSfh9flevVSaLp5NAWrtmZbT:1HqqYHQ8MVSaLB5obT
Checks for missing Authenticode signature.
resource |
---|
49ca57b762cf25ff72b083d1090abd99_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ