HookOff
HookOn
IsHooking
Behavioral task
behavioral1
Sample
5f13a56c1ce7676c1668f214bda3705e_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5f13a56c1ce7676c1668f214bda3705e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5f13a56c1ce7676c1668f214bda3705e_JaffaCakes118
Size
371KB
MD5
5f13a56c1ce7676c1668f214bda3705e
SHA1
12bd480d503064e268167a1f0d37d2d1516e8a46
SHA256
75bd09a0461896556a1a2a3020d07455dad4e950a1a959562017602d62e215f8
SHA512
d2645b1c5516db2a4763a3a4e3fadedaa3b0e1122146ebade6ae927638c280e12faf312ff3604f59c93d563bf9b5f3e3b4400e68568bf1e3d09fc5a5cab13bea
SSDEEP
6144:Qmj0TGsSWoO1Uzw4bATNhMF7NVwI//4Tl6s4HVDLo5Zh/eOdvtJBEo1AVyt:QjTGx8IwmMvMFpKI4CBLo5DThKVyt
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
5f13a56c1ce7676c1668f214bda3705e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
HookOff
HookOn
IsHooking
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE