Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
Static task
static1
Behavioral task
behavioral1
Sample
1034e07d7d6574fbcd445352c747dd94_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1034e07d7d6574fbcd445352c747dd94_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
1034e07d7d6574fbcd445352c747dd94_JaffaCakes118
Size
28KB
MD5
1034e07d7d6574fbcd445352c747dd94
SHA1
d6df0a94c571582359df1a87b11242a0c4b64966
SHA256
c579dae9421c757d48fef7d713d45bc641105bac0d269c008447e0762c0b5f67
SHA512
b7802ab3f445d104f392b5a08fdea71a2243c65d2872101be67e66657fd15ca8bba22441f59e26c24e3eb6bf2a44992849c19a20faf62312ebddedab9dbc18ab
SSDEEP
384:enUpSvko9Az3KxdxzIHvZYYdpjDN5sJxfeuRdmvq:avGKBzWvXjDYfeuRIvq
Checks for missing Authenticode signature.
resource |
---|
1034e07d7d6574fbcd445352c747dd94_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE