DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
Behavioral task
behavioral1
Sample
0f72e2880ae8837b66efac9fe135cf4e_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0f72e2880ae8837b66efac9fe135cf4e_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
0f72e2880ae8837b66efac9fe135cf4e_JaffaCakes118
Size
22KB
MD5
0f72e2880ae8837b66efac9fe135cf4e
SHA1
363a2d300991c8b3cccca5603181635e354173df
SHA256
c724c530a7a9ced0f7c2468093e6c5ae8ad51389708cddb292333425baebd022
SHA512
f3629184cdfba212af199c8dff9c1e3f61a39cf6a923f2b7008a7414ac7716de794ba8de556f89562ec54e55318d88f1ae85a32a104e8d71b78004c5faf81ac9
SSDEEP
384:9cxnRaFoDkCz5k4zBNCFZgK0kgOjPSN9Jy3834TikPc:6nvkCz5xWZN0V3438Fqc
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
0f72e2880ae8837b66efac9fe135cf4e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE