DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
fdb01fbf42304bb3550debcc9e34b7a2_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdb01fbf42304bb3550debcc9e34b7a2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
fdb01fbf42304bb3550debcc9e34b7a2_JaffaCakes118
Size
236KB
MD5
fdb01fbf42304bb3550debcc9e34b7a2
SHA1
cfe3e94c6d88bb313ad26cda25c36e85c13fb72e
SHA256
03eb688b7771eef686ad469c32ac252d3608dc2c18b907401e0181e6f8961ecf
SHA512
d2779d0f9c0770b836b75fe961fa7f747d6d956606f288732ae8a86075e3769dff48678e9e3e8765f83e558c7ef825e8f3c52e923b6bbb5bf208f898d1313562
SSDEEP
1536:ESq6QX/h+nKRFKiHCj/yYQM6UxKEpDHjM8M72cUr3333aYeO06RG3yERHGW:Lw/g8DULY80XYnbcDUW
Checks for missing Authenticode signature.
resource |
---|
fdb01fbf42304bb3550debcc9e34b7a2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ