DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
05318d7d376ea55271782ec54de8e9c5_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
05318d7d376ea55271782ec54de8e9c5_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
05318d7d376ea55271782ec54de8e9c5_JaffaCakes118
Size
47KB
MD5
05318d7d376ea55271782ec54de8e9c5
SHA1
b46203e794ec16f17f3b21444dab0f1bba804582
SHA256
2269010074c8a8f7055ba36fdaf970627736f56e9833fc401e368effdc68968f
SHA512
dcedad6a063252c07cbddf40e64273de428b450e067ae79e486039e6ec5ff7e81a74514c4ec88b804c32ca0ce932bd30332bebb17ee257a054733f2d0b0ac720
SSDEEP
768:V//90OUbVkZzP222bWrIHwAJUKRl772JmO1fefA+rgjcArfdj:V7nb2bWCBJP291fe1gjcArfd
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
05318d7d376ea55271782ec54de8e9c5_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ