DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
a587a39d6ac2521300f0d416556059bf_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a587a39d6ac2521300f0d416556059bf_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a587a39d6ac2521300f0d416556059bf_JaffaCakes118
Size
116KB
MD5
a587a39d6ac2521300f0d416556059bf
SHA1
137ebf62b4a1f0491f812b28f9f81ca9dc604caf
SHA256
7c8735224cac58d317022761aef3b782fef63aafb1fc37d45f486d796dd78598
SHA512
8eafda7a8c114889fb6fde184fa0ec3056557136978ad1e810df302374c978415116794dc0bcfb21f5b424fe058903e88062048b221c66d448c06b51c97145ad
SSDEEP
3072:QwLxLUbgIZ+yB8YHVISHcT+gq+wF7rBePDvC9Kymyv:j5UbWAdvFvgbvY
Checks for missing Authenticode signature.
resource |
---|
a587a39d6ac2521300f0d416556059bf_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ