DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Behavioral task
behavioral1
Sample
b2e7d54b4e1981fc11e34317259839ef_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b2e7d54b4e1981fc11e34317259839ef_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b2e7d54b4e1981fc11e34317259839ef_JaffaCakes118
Size
162KB
MD5
b2e7d54b4e1981fc11e34317259839ef
SHA1
b2271c76b6682203f63bf6cedf83315ac06bb49c
SHA256
d55d00c4ac498246318100d81d97b2e0daf9ea421fc16081668aeb24758b3f07
SHA512
e005181dae668f2db2326872d279c241a90865feefc5c481ee1e6ef787cad150fffe49df2ca2d24325c1e075a3dfa0001b69a764f1caef57eb330a97e8a52d2c
SSDEEP
3072:s8tsXyou2Qg496HM0XU+aDembri59tuvdZhhL/H0XpmT9ogI7iFSAKE959Eu:XsiL2Wn+aCP0vdZhhL0MTEeKE9zEu
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
b2e7d54b4e1981fc11e34317259839ef_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE