DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
ea288be8d898ce8e24e2630713496b2c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea288be8d898ce8e24e2630713496b2c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ea288be8d898ce8e24e2630713496b2c_JaffaCakes118
Size
35KB
MD5
ea288be8d898ce8e24e2630713496b2c
SHA1
24d7b7d68b07c29049167c2a386d6f4bf51879a5
SHA256
7bb89fbe07bdc09f7fdaf50da5ae00ffbeb268f17c78bada6c006f64a455498b
SHA512
643c998d7b2efca42ccf8265f2859c8568f8bcd5f4ec3b36fe3e92ea574788d09b4911759c1aa173112d8913918e1a4f6137be718cad0327760557bc3587acba
SSDEEP
768:IaSACC8F+4enywFtfINjVQ60L11TpFff6:IaSAWwL1SVQ6ez6
Checks for missing Authenticode signature.
resource |
---|
ea288be8d898ce8e24e2630713496b2c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ