HookOff
HookOn
Behavioral task
behavioral1
Sample
cdd5bb228e123263c46d5517e1d2d4a3_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cdd5bb228e123263c46d5517e1d2d4a3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
cdd5bb228e123263c46d5517e1d2d4a3_JaffaCakes118
Size
775KB
MD5
cdd5bb228e123263c46d5517e1d2d4a3
SHA1
1dd4d0e7bb9be99fc6190494d5b0ed2a6ea8b268
SHA256
4d3f2ac8bcf8a122d35edd36509532f4d37d8d5f74105af3f764894b2a5871ac
SHA512
f425a9e57f6a4c9e6e5f04b9ca294461316af3ad8127cf1f2d10fb2c0190bc61c2fdd2ec679293a390ae1e8ec7c2531b424d14c6619ef605ccf594f716118da5
SSDEEP
12288:9uucBG7Rhn8Wt9irZFW2rC75dbFMKw7MP2GeCFcudXFsgKFMvwmb1TLjNh8/J:9uShnbijWfd0MOGeCFcuLKFWwmb1/E/J
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
cdd5bb228e123263c46d5517e1d2d4a3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
HookOff
HookOn
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE