DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MgHookOk
MgHookOn
Static task
static1
Behavioral task
behavioral1
Sample
f6fc552a7d45a1349dcd388c895e5659_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6fc552a7d45a1349dcd388c895e5659_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
f6fc552a7d45a1349dcd388c895e5659_JaffaCakes118
Size
29KB
MD5
f6fc552a7d45a1349dcd388c895e5659
SHA1
56ef9d988ea69703496bff36c71504249dc99558
SHA256
638b4dbf579cf65c7f841eeaaaf682a698999c6e2734f9c7f84aa450c23514ca
SHA512
b561831c2469c709fd927c170569ecadca0825a01dc0f4d1fc1785745535f90b60757221a1c785f80775f9f6bdf6bdff87a89ba11b44ce7571a961ea7591b528
SSDEEP
768:3KSCquFw0GQO/mRsrAs1VlBFlUzrt5dDyv+:NCquFw0GQid/0z5o+
Checks for missing Authenticode signature.
resource |
---|
f6fc552a7d45a1349dcd388c895e5659_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MgHookOk
MgHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ