Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
Static task
static1
Behavioral task
behavioral1
Sample
136fc0ced8c03f0e014ea2c185adda3d_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
136fc0ced8c03f0e014ea2c185adda3d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
136fc0ced8c03f0e014ea2c185adda3d_JaffaCakes118
Size
32KB
MD5
136fc0ced8c03f0e014ea2c185adda3d
SHA1
e947bf71233c63c79ff3a8635fa48c8ce777f2e8
SHA256
e37e14534ffc77eab5d7635496240a99628dc34a956fcbc9bf1ea99a3486d630
SHA512
c6ca1f9405fb689feada34113f3ffec0cf181eb37529af69c1cbd16353f07ce809deb939bba781f421c10a6af0b2bd3d547afc55fa328ccd64e09860e3479b85
SSDEEP
384:wAa2iOZ0AK67O+EGx3Np7ojBEmxqO+nr:wKxZ0zvQ3Np7cPxqOG
Checks for missing Authenticode signature.
resource |
---|
136fc0ced8c03f0e014ea2c185adda3d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE