DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
8a5771bbb9b2125403231362d7198090_JaffaCakes118.dll
Resource
win7-20240729-en
Target
8a5771bbb9b2125403231362d7198090_JaffaCakes118
Size
140KB
MD5
8a5771bbb9b2125403231362d7198090
SHA1
4bc7208871b3ac160777c66ddad2d587bdeb0ef9
SHA256
925f23937dd0f7c5e7846a73660848d2cbc5429bab1a16ebeacbdb82e258b71a
SHA512
b4f392100f5f5335c3c9e1fc7c1bc565dd2a65b43919d9e5f6b6828d86a8e3baedbc9a0e08923a8d2e59b66826a40f070ca11b8abe40e1ec2c68930f5b5eaf45
SSDEEP
1536:89OOdB9rouo2WMdcwmwlZGIuw62PSo8Yd5Nej/KdvE3CFTtmYzKw02Omw:89OYVmtwdiIuWa/Kdsl+Kz2Od
Checks for missing Authenticode signature.
resource |
---|
8a5771bbb9b2125403231362d7198090_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE