DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
Static task
static1
Behavioral task
behavioral1
Sample
33eb0e279fa783de7d08f0905304c87b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
33eb0e279fa783de7d08f0905304c87b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
33eb0e279fa783de7d08f0905304c87b_JaffaCakes118
Size
46KB
MD5
33eb0e279fa783de7d08f0905304c87b
SHA1
108b505211b3d31fdfb0f0c92ddf262729379f13
SHA256
c9b11d9755ce3cc79785a1ca4783c099a9ee7b65dfd69f7d746ef9da860bb657
SHA512
dcb8641e4c86f3ad69d1112dd595cf6a018a902027d752d2b2a3486187e60cb4f4d1fc1ee6cab3bec0aba3be48d66b866c3d373900c3f77151b5c40d6525f33e
SSDEEP
768:9HGOWRCd7+ntUdVCPQhJeCXF/Q9lyPm2PvwgBSzc:cO5d7+ntSmQhJeCXGLyPW2kc
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
Checks for missing Authenticode signature.
resource |
---|
33eb0e279fa783de7d08f0905304c87b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOp
MsgHookif
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE