DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
858a41f4f85967cd6d14626e73396373_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
858a41f4f85967cd6d14626e73396373_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
858a41f4f85967cd6d14626e73396373_JaffaCakes118
Size
71KB
MD5
858a41f4f85967cd6d14626e73396373
SHA1
b861a15ea44b69beddb2238980f7034446e22108
SHA256
95647211e3a55c4eae4381a3957fb1d0a81f66fea440c7ed1aad621204492281
SHA512
5beac5878bc8d52b5a93ec360589bbd7e199198f99e749887d6da8bd5c0eeab86428753fb096214eec68644aa259415900a18cd2d087a21c7f6350c8cb36a056
SSDEEP
1536:tJnE/EjKZL90auTJ4pj0HoT7GSmuVqhlJZ71t:g9Wq10HxUq
Checks for missing Authenticode signature.
resource |
---|
858a41f4f85967cd6d14626e73396373_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE