DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
b0e222191b2730259cb76fd66594c76e_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b0e222191b2730259cb76fd66594c76e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b0e222191b2730259cb76fd66594c76e_JaffaCakes118
Size
93KB
MD5
b0e222191b2730259cb76fd66594c76e
SHA1
fabc2bba4220ec4882e95af610782b1206463d21
SHA256
db1fc7a1ec4532d1799fe41c10c105b3c4e8f557966cdf0733ce43f427fd8177
SHA512
e8051fce0fab504a230e6aeec1d3fdeb69556badd006e7300b4707fc56f01de10b2bb43b8fce6b272bd111186ac7b27d8b1a558f965bdf2d41b739ab3c3a298f
SSDEEP
1536:4ze9phldmgr6F3+2MFzgzAB/yqPnXLDpaj14TuhQ0HqOKbF5Mk/X:ge9p7dJv3zzfhax6uacqpL/
Checks for missing Authenticode signature.
resource |
---|
b0e222191b2730259cb76fd66594c76e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
SelectObject
InternetReadFile
SafeArrayPtrOfIndex
WSACleanup
OpenProcessToken
GetKeyboardType
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE