DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
15ec6d6ef4b4e2f2786db9a536b11670_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15ec6d6ef4b4e2f2786db9a536b11670_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
15ec6d6ef4b4e2f2786db9a536b11670_JaffaCakes118
Size
174KB
MD5
15ec6d6ef4b4e2f2786db9a536b11670
SHA1
0ec70fa0e9c7ef98c9075612d78574c775560452
SHA256
67e7a18b1e5d638c57dd21d5b11265c24e2ee35f88357c5cb7deebebde515a34
SHA512
71c08d46475ef049b5522416d727106099482157bb52ee736a652d6a78572a31c8a3b369ee0bbd8f68006c2366563c6c576b8f87fbc983651205427aafc5d18b
SSDEEP
3072:5/P/5a+u9xB5ZIIAXbL/yspSbbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVU7i:5h7u9xrZIdbrowvP6bQ7yMP+DE827Csw
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
15ec6d6ef4b4e2f2786db9a536b11670_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE