DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
dd3569b14de7df1e548e741e18565c7c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd3569b14de7df1e548e741e18565c7c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
dd3569b14de7df1e548e741e18565c7c_JaffaCakes118
Size
99KB
MD5
dd3569b14de7df1e548e741e18565c7c
SHA1
d3ae69977f4e0b03316a91478bffde09722b06c8
SHA256
999f1ddb3b7aa69da984497c576e9653e6b9c9b2932318104ccb59026f086532
SHA512
ea0f95c8f5eb87f2b35d2e25766b077e2d846ebf5c747bf431981e3c829be3d2bd70f9a032c27b49a8224da2d7ba56abfca8d9fc477f72010a179caabe20d8bf
SSDEEP
3072:2AuyXCeJfW3O2U3RCRs97+abkMvXoLVvafKtos/U0G9:2TyCezRCkwof+l
Checks for missing Authenticode signature.
resource |
---|
dd3569b14de7df1e548e741e18565c7c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ