HookProc
InstallHook
UnHook
Behavioral task
behavioral1
Sample
0a14af58dc68243c8c5349d657b2ead7_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0a14af58dc68243c8c5349d657b2ead7_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
0a14af58dc68243c8c5349d657b2ead7_JaffaCakes118
Size
19KB
MD5
0a14af58dc68243c8c5349d657b2ead7
SHA1
438f72cf51f7f81ea3a8c8bd0ead6285f59f9421
SHA256
25b43029434ef82934471d1b616999ff23cd25d9745657b218f76d4308103bad
SHA512
2f2618563aaa8c37824f06f4e3929454b2e45713450ed80e3f595367ae3947e519635934b030ffc5690853c7bbaab121dd67e7fdf9ac0222b518358298d91dab
SSDEEP
384:9sXKfLLqVTrnP7bbFN7kXGmj012NhPtAxDr6+e9Pfqbn1:9s6fqVPf7k9012nmx6ha5
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
0a14af58dc68243c8c5349d657b2ead7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
HookProc
InstallHook
UnHook
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE