DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
6676f572bf55c6b27cc7cb5595e74d82_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6676f572bf55c6b27cc7cb5595e74d82_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
6676f572bf55c6b27cc7cb5595e74d82_JaffaCakes118
Size
264KB
MD5
6676f572bf55c6b27cc7cb5595e74d82
SHA1
10182c89e5d4ae5679590accd345f9143937a9a8
SHA256
07de9d7ef658bb38e9084a838c82a175da2de31531364863299a323ac4d3365f
SHA512
6fc4483156e298131a05c5d42a86a123cb40617e12a6799e2ad50004de2f39c40e199c925d5d6e1c732d9b529530490c03dd75f03a296b7b5b5692ccfd9f55b4
SSDEEP
6144:jgIzyKojwcP5ZoDK5KLWdYmqyOn+aC1meyUGimMzYxczl6h1jVJ:j+0+ZoDK5KLWdYmqyGW1meyUGp7xdh1T
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
6676f572bf55c6b27cc7cb5595e74d82_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE