HookOff
HookOn
Behavioral task
behavioral1
Sample
ae7bb89ed0f8f842edb033e3595ec6b3_JaffaCakes118.dll
Resource
win7-20240704-en
Target
ae7bb89ed0f8f842edb033e3595ec6b3_JaffaCakes118
Size
62KB
MD5
ae7bb89ed0f8f842edb033e3595ec6b3
SHA1
40db7bc3d799476b21900bcf6be94b8c04b182c5
SHA256
8b67d24bb9afb5138247626227ea1e6ef2d5028b6dde14093ca5af29eada141c
SHA512
295034027a2971bffef3cb138f0a8a4871c2ff88f94e7c7f88cd97e3bb15e2a7c846398778a9debaf4a99277da1e479ff7f3f710f3d12ddf7916937184306b89
SSDEEP
768:Be3qR1szBySaCRANkjY9YLBk8/vV9CZqbc2V9PLVMox/NKt:k3qR1s9EUPjLLPP1LVML
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
ae7bb89ed0f8f842edb033e3595ec6b3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
HookOff
HookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE