DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOk
MsgHookOn
Behavioral task
behavioral1
Sample
c238f65cc5a00c8fc07d326c880a1fd2_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c238f65cc5a00c8fc07d326c880a1fd2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c238f65cc5a00c8fc07d326c880a1fd2_JaffaCakes118
Size
348KB
MD5
c238f65cc5a00c8fc07d326c880a1fd2
SHA1
d65d9edd1ef5f0761e2b47db2a4c36c6ccf4e446
SHA256
81d405523445304ee07d8fd303906d390d62c247255c7a1a4281006ff370bb7d
SHA512
0909ac9bf04425fd2d08c933b86bc060e1be5e69d46d71c0486031813604dd00abf6ecb1694b7665ad88f9c5c121b7b9f688c1304c2557e49cfc4730d70e50e0
SSDEEP
6144:+qKMF2idZecnl20lHRxp3gHe0M6E81xS0WcHpsFbBqCQuv:hZF3Z4mxxV0MHoTAFb9Qe
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
c238f65cc5a00c8fc07d326c880a1fd2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOk
MsgHookOn
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE