DllCanUnloadNow
DllGetClassObject
inject
Static task
static1
Behavioral task
behavioral1
Sample
7561049824fb5e8f1727ea140ac9b089_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7561049824fb5e8f1727ea140ac9b089_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
7561049824fb5e8f1727ea140ac9b089_JaffaCakes118
Size
65KB
MD5
7561049824fb5e8f1727ea140ac9b089
SHA1
659a05bb6b7221f61d619c70fdf6f7bbbddec92a
SHA256
166c4d3c8f54e94cac6d0281110dfac23c3cee0aeef0189cd46b0b441b9791d7
SHA512
ac7c33be63ca23e053f4d7570f07a4f0c70eed5a7e5245829a18561062a8d6d7bd752c6d2645a67efbf99d7224e6158dcfca0ccc53637ea292076c7067d3c660
SSDEEP
1536:/Zb4X9sh+ZSujBYrVJt6YdjZwQ8WPKJZ7:hbA9sUjBY7tPdNwQiX7
Checks for missing Authenticode signature.
resource |
---|
7561049824fb5e8f1727ea140ac9b089_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
DllCanUnloadNow
DllGetClassObject
inject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE