DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
83b496a35d51c409860d9c1bec046637_JaffaCakes118.dll
Resource
win7-20240708-en
Target
83b496a35d51c409860d9c1bec046637_JaffaCakes118
Size
91KB
MD5
83b496a35d51c409860d9c1bec046637
SHA1
419a03ae930d508db3e2c08183ded249e596bef6
SHA256
f44f84fb3164e4b14e9449370679fc85727b086cf7878275b1135ee08a87b42b
SHA512
ee82e1ef820545e548bb2cc85ffe004e1785da5c3f1ff644f11679dab689df3ea9c5448c15de3dcf8ff4dd3563d124331db867bc1780baa1945312b5395ab2d9
SSDEEP
1536:oUfnaXB/LDOjfWnJbN+Se1WXGi9fkGisomt5jKV7LNQZ6qXxfl9Zx4+C4VKLcTOH:FnaB/27WtAhni9fkGiMk369FfC9cxZdM
Checks for missing Authenticode signature.
resource |
---|
83b496a35d51c409860d9c1bec046637_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE