DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
26f991fda6bd31505856a9749ed45de1_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
26f991fda6bd31505856a9749ed45de1_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
26f991fda6bd31505856a9749ed45de1_JaffaCakes118
Size
69KB
MD5
26f991fda6bd31505856a9749ed45de1
SHA1
695fb418c255719f59b214d06379e7479a7bc6bb
SHA256
91ba65398a445eb0736555a49f395c257edf264a5dcf554fba0a5f3ac813f757
SHA512
8cc146e0d8a9e3f3a97edbeee4dde6a1af971af97ddedd1a1f577e744f3ae845cae5d9209d972b4ad8952a34bc5face2068e72f4dc37a513391abe472a3a5f7e
SSDEEP
1536:bra4iBPAesB1+odZOvaES0uDsnwyn25Jq+CXuJobUDuq7Gh+AUhtsk:bsEAodZOvaES05nwyW4wobUyq7Gh+AUt
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
26f991fda6bd31505856a9749ed45de1_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ