DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
e0b77814ff3386b6abc8b500e29248b3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0b77814ff3386b6abc8b500e29248b3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
e0b77814ff3386b6abc8b500e29248b3_JaffaCakes118
Size
59KB
MD5
e0b77814ff3386b6abc8b500e29248b3
SHA1
f1cb9bbe08ea7fba16fbdefb23e01240e8753787
SHA256
abc4161a0f186429ed760c91a21af42b3eb193ea7b2b70bca805884dd6c9975c
SHA512
4d098cf88727ee3fa1aacfd51d4dc00858e28c411b80a646d35b772a8287c314fb8f24046c0672eb27042e57f9580d8be07470151e789fa085a89b03c695148a
SSDEEP
1536:+9IAhPR0mja//e4AeSSjO0pjKGBtX6MHh2KL:+9IAhPR0mjam4pLjdBx3D
Checks for missing Authenticode signature.
resource |
---|
e0b77814ff3386b6abc8b500e29248b3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
InternetReadFile
SafeArrayPtrOfIndex
OpenProcessToken
GetPixel
WaitMessage
WSACleanup
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE