DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
d098da5584a588c66a7998a93c57c710_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d098da5584a588c66a7998a93c57c710_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d098da5584a588c66a7998a93c57c710_JaffaCakes118
Size
179KB
MD5
d098da5584a588c66a7998a93c57c710
SHA1
a73c08432c7ac90a28b0a99deb446f541c81200a
SHA256
829c00f300580b4d3e9a3c96be5b4b296a9acb92e7ef9e9bc940c4229b853a34
SHA512
0d5d3b3f84a5d1ac2c72bb8838ba50a357235dc8872e2cd34f17f88090180c44be839f53d802c270b04e8e43698752839a68a123375697e91446302ef778aebc
SSDEEP
3072:KMjcZvlBbJxCD3lkxC1FxTjtWbbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVUU:KMgZvl5JMb+xCRWwvP6bQ7yMP+DE827I
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
d098da5584a588c66a7998a93c57c710_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE