DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
d03e07e5144a441d56b8d06730644814_JaffaCakes118.dll
Resource
win7-20240903-en
Target
d03e07e5144a441d56b8d06730644814_JaffaCakes118
Size
88KB
MD5
d03e07e5144a441d56b8d06730644814
SHA1
6f2e4f1935183fd4115d82c5a1803d6b87df7701
SHA256
3004c42d7139f08df3f9b4072188497331e0adc62c6bd601b68f8ae5c8f18374
SHA512
a70d0f99c6570aa8695f995f4e4b2b36130256939da2d4cc0bded07c4078407e704b060dbef530500e785c4deda517792af6f5bef06f11a8be8d493d34608bc5
SSDEEP
1536:cfrXqpTAN1h13tAHm1DQQfTomeNPdVzRUOKiP5MqSyjT+ZhkG45WyjdEAHmB:VTANL13GHm1DBomMIOFPxpmj45RtHmB
Checks for missing Authenticode signature.
resource |
---|
d03e07e5144a441d56b8d06730644814_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE