RunDllHostCallBack
RunKyoHttpCallMeok
VMP�������ǽ�β
VMP�������ǿ�ʼ
ȡ��ʵ��ַ
Static task
static1
Behavioral task
behavioral1
Sample
8d1c976d1a363d3d36918919ff5ea5cc_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8d1c976d1a363d3d36918919ff5ea5cc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
8d1c976d1a363d3d36918919ff5ea5cc_JaffaCakes118
Size
314KB
MD5
8d1c976d1a363d3d36918919ff5ea5cc
SHA1
856312a2a5c44157c2fde26cbb4726305957ae8f
SHA256
59401599e99b272e0166e771a366b2cc5ba5bbf4815e897699113fbe03d79b6b
SHA512
fcfb8ca176ab63a484b4d696c1e51fd0fc45d4eda107a6cb67ed78019059f9c30c9709c2142b245c05be4abf0fc63e37d6eb76584f917c59277b395222804756
SSDEEP
6144:+XTReP4dUyDR7R0dwVklmgR7He7xhLUSo5CcffPhU5potZk36iZ1p:+1WkUyDR7Dg7HAxdllufPa5pke6iDp
Checks for missing Authenticode signature.
resource |
---|
8d1c976d1a363d3d36918919ff5ea5cc_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RunDllHostCallBack
RunKyoHttpCallMeok
VMP�������ǽ�β
VMP�������ǿ�ʼ
ȡ��ʵ��ַ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE