Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
Behavioral task
behavioral1
Sample
23af25f579a1c18c87e34c6372e84a26_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23af25f579a1c18c87e34c6372e84a26_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
23af25f579a1c18c87e34c6372e84a26_JaffaCakes118
Size
26KB
MD5
23af25f579a1c18c87e34c6372e84a26
SHA1
97eb958ee55d845dd517e6c9af530d2bbde96e2f
SHA256
2e2ce25a6c3b60ad88857b977940632503029889fb9968f5630afb250d0e1f66
SHA512
03596e0b7f8770a749e85cd60cd735f0c802f53d8712b0007ad38cdfbc39124f16165f4a1484500c17f2d6431a95592e29634419da7ab133c979e76c8c862518
SSDEEP
384:WOmsTUJflpiPmYu7kUHPkGOS3muWOJirLQc9Qxi2QSav:1nU9piwFMWjWOJirL99J2QSS
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
23af25f579a1c18c87e34c6372e84a26_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ