DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Behavioral task
behavioral1
Sample
009630426f2274a881a496e9a7846859_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
009630426f2274a881a496e9a7846859_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
009630426f2274a881a496e9a7846859_JaffaCakes118
Size
89KB
MD5
009630426f2274a881a496e9a7846859
SHA1
34b121ba6cad5a3de7c77892acc1ae1035cd7a4b
SHA256
2195abfd0cb42d42d198cc1aeb4ba6404c6a954a0d1c5efbdcc0b5c75a314b5e
SHA512
c07e5338f0668321486414067c25157b22d4e384336bd676d3793714c89a12fd3902e34ed2bcdee578d721f91e66a851234402ca61219bb8bf1e9f0ee27aed62
SSDEEP
1536:c9qSQ4pmwgvv/iNIeB8tUOLd1AH75YKpO/Y6kJji+GcxmsE70j:MTmDvTeB4USd1AH75YKA8QefE70j
resource | yara_rule |
---|---|
sample | modiloader_stage2 |
Checks for missing Authenticode signature.
resource |
---|
009630426f2274a881a496e9a7846859_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ