DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
2a0e6532e7a9e8fe44fe7ce78fcb6eb6_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a0e6532e7a9e8fe44fe7ce78fcb6eb6_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2a0e6532e7a9e8fe44fe7ce78fcb6eb6_JaffaCakes118
Size
283KB
MD5
2a0e6532e7a9e8fe44fe7ce78fcb6eb6
SHA1
aeb83dfd8b2b58e3e4885a382e6b23bce3ed4f8c
SHA256
768c7fe9ee2f0d12467c071c79879c24781cbed5c2468b10ccbd41b203df6737
SHA512
7c8a17d9b2481904b4e4143d1024758379109b02e0e87277f9b966f7e020b2280179824155525863e0956adeee78368ce49ca0feb8bb597f37fc62c3d56b7428
SSDEEP
6144:tTQqzsnVn+aC1meyUGimMSyBRg8YIYcMvhdoBKHru:Zkn9W1meyUGpnyqVZdMt
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
2a0e6532e7a9e8fe44fe7ce78fcb6eb6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE