DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
b93365a4068441793511ec59c39fe3d4_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b93365a4068441793511ec59c39fe3d4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b93365a4068441793511ec59c39fe3d4_JaffaCakes118
Size
71KB
MD5
b93365a4068441793511ec59c39fe3d4
SHA1
cbec11914e9af204fef5b63a21e6cd7959064174
SHA256
428cbadc19f018ea2d292449cdd092fc116e9d911de63a9e15f5e9b7ed411abd
SHA512
675a35eb37905afbd30d31dd6ede01bfa5170e0dbebc2a5ea4134b2bbfbdcd15e59d10e68fe2ce9e8f3e17a9ef313c100102b2ef967419b3e0aba6962c9d7b66
SSDEEP
1536:6yadSH/Sz5v5wWSpGfSA7vbXDda9+vbba6kdPmldKSA4PU:6yadv5CObzdLvvjrA
Checks for missing Authenticode signature.
resource |
---|
b93365a4068441793511ec59c39fe3d4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE