DllCanUnloadNow
DllGetClassObject
inject
Static task
static1
Behavioral task
behavioral1
Sample
6fa004b1bdbe24a35204fdedff4a6fd4_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6fa004b1bdbe24a35204fdedff4a6fd4_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
6fa004b1bdbe24a35204fdedff4a6fd4_JaffaCakes118
Size
65KB
MD5
6fa004b1bdbe24a35204fdedff4a6fd4
SHA1
8ccf247d7d2cf800302bd71faf6063ac6c2ba7e7
SHA256
76b3294b68048a02c0be115398b95bcd33ab0dec29a9f321e482edbfb8522e7c
SHA512
61fd44721c2abe4ab2834e074b4ae8d745c44636d8fb72bc91c3707a0301979b11f06d988edecaa060aea623d1b40ba3964c39db7b87e7c084ae3bacb6119656
SSDEEP
1536:Uvl4cHpgcbiFmsssxHhALe0DCOMUAH+yH7+Y8njYB1NPHKxlIH:MpgcbnssbLyUAHbSn0B1NPqHIH
Checks for missing Authenticode signature.
resource |
---|
6fa004b1bdbe24a35204fdedff4a6fd4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
DllCanUnloadNow
DllGetClassObject
inject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE