CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
6ae4e70fc8519e38e13e1c57af5c3d2b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6ae4e70fc8519e38e13e1c57af5c3d2b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
6ae4e70fc8519e38e13e1c57af5c3d2b_JaffaCakes118
Size
50KB
MD5
6ae4e70fc8519e38e13e1c57af5c3d2b
SHA1
23dc8ee451fae21cefd2e7dc5f8cd8f980a3ca8c
SHA256
9806f0ee1b77dec948a6d505630776e76cb46f62d8c59d966eb2cc030d7dbff5
SHA512
cdd974c09c920ed7a80c2fc861f36e6986649316df9c2b750bc6d09da0da9422a7b75a1256756fc2ac656f8618b65ea3f3953ee4c5c0a5bfc4a0e54b7e354414
SSDEEP
768:XxjDQp6DsOfL62l8ovOr4xTxYOblK7lkkqLS+1AJmmU+O3aBDWjv4uZ15K8cnBX:BfQAl+7ovO4dYF7uxeUmU+Ilv5lK5nx
Checks for missing Authenticode signature.
resource |
---|
6ae4e70fc8519e38e13e1c57af5c3d2b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
time
UnhookWindowsHookEx
RegQueryValueExA
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE