DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
d1729d0ad5080099b1004ac07de96e95_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1729d0ad5080099b1004ac07de96e95_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d1729d0ad5080099b1004ac07de96e95_JaffaCakes118
Size
167KB
MD5
d1729d0ad5080099b1004ac07de96e95
SHA1
35a95df1bc815dac637690102cc24b8dd710fef8
SHA256
ca7c9875075c49c610142c8d8db5a3edd9e830c4b676049e6647cada1f38b287
SHA512
114e50612555b7c939222ed394b9d8f0dcc2c76cfc53f006b319027bf44c415d220d6651eb12435b236b12a3ace2db5d85af67565f717b2dfe1418256ea672bb
SSDEEP
3072:T4JUOQSPVrgn0Uy+xLV6KCzFJKoilQVx:T4vVrgnxh6KCzFJKoQ
Checks for missing Authenticode signature.
resource |
---|
d1729d0ad5080099b1004ac07de96e95_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE