RunDllHostCallBack
VMP�������ǽ�β
VMP�������ǿ�ʼ
����ȫ������
����˲��CALL
����Call
�ָ�Ѫ��
�����̶�CALL
����
�Զ��幥��
Static task
static1
Behavioral task
behavioral1
Sample
d381f3aa2ac779e50a7f2f8ab87dcc79_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d381f3aa2ac779e50a7f2f8ab87dcc79_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d381f3aa2ac779e50a7f2f8ab87dcc79_JaffaCakes118
Size
672KB
MD5
d381f3aa2ac779e50a7f2f8ab87dcc79
SHA1
6b285a779d007cdaaf1826046ccd1dc8189c71a9
SHA256
8fdd5f767d1504cd615810256f91ab7a6cf8c355a6e52d0bd9735b82853e87c9
SHA512
d82cb511cc0bb31f4367ead4f2f00b1be050d14d4a2ac136e5dddb31f56cae5eea6ff2eee740ca1be80b100991b264004e4ac9e6fcc60eb00d70a9fc36bc435c
SSDEEP
12288:l68ZziKEhiVBvhPd4RjP0AdJf+4P5IZGgtqCYlamM5lNwSJUtuGKYNT:8ukhZRI0+4GfptNwSJUtbT
Checks for missing Authenticode signature.
resource |
---|
d381f3aa2ac779e50a7f2f8ab87dcc79_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RunDllHostCallBack
VMP�������ǽ�β
VMP�������ǿ�ʼ
����ȫ������
����˲��CALL
����Call
�ָ�Ѫ��
�����̶�CALL
����
�Զ��幥��
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE