DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a6ee42a9de1c4aa4375bfcee14258e3b_JaffaCakes118.dll
Resource
win7-20240705-en
Target
a6ee42a9de1c4aa4375bfcee14258e3b_JaffaCakes118
Size
481KB
MD5
a6ee42a9de1c4aa4375bfcee14258e3b
SHA1
e51328a13fe6c75333918b30531ebc4081e4760f
SHA256
3917f036d538aa1c5153b3c4fce26b1cbfe36e6396d678c8575ce48b60b52e19
SHA512
946fee7017f09972b77fc04720399c03817a6dec4c6f30174cce868cfeffed49e1ec3f66a4b86155bb3d21cc84dfd391ec61b829ff4a313475de6bd03abb3b07
SSDEEP
6144:s3XLK/w46LKlcwSFkzn/nwFAAyPAC7J/GZDCnnmT5CrTr5seXZKg4Xu:s3XpL7FkzYFAnAYJJVdFo
Checks for missing Authenticode signature.
resource |
---|
a6ee42a9de1c4aa4375bfcee14258e3b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
MessageBoxA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ