DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
779ffe37c881cf147cab128c241b9120_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
779ffe37c881cf147cab128c241b9120_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
779ffe37c881cf147cab128c241b9120_JaffaCakes118
Size
158KB
MD5
779ffe37c881cf147cab128c241b9120
SHA1
126d0502e47934a9cee81bae8056f1ee120ccf4c
SHA256
59fb0a8072286424b32691a92fcc8b408d6c659980d66dfc232310dda504b2ee
SHA512
7c32179cbb7f3e2a25523472c97e12f2ed06847982876a2856a77d49ee1213acdbdc70227143f33d0aff685eee6c5bc94a209b2108260611b62a829ee0491e75
SSDEEP
3072:Dj0tU7ljnu29SwWS+frszUbt//B8xd96EpK:DSSVuFc7a//B68E
Checks for missing Authenticode signature.
resource |
---|
779ffe37c881cf147cab128c241b9120_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE