DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
MyHookOn
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
e0edd9270b9f1db50b0bf64eac5bc0ff_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0edd9270b9f1db50b0bf64eac5bc0ff_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
e0edd9270b9f1db50b0bf64eac5bc0ff_JaffaCakes118
Size
56KB
MD5
e0edd9270b9f1db50b0bf64eac5bc0ff
SHA1
d5b675715a147694a7c045ea4c4dde13d014a353
SHA256
6fc1f6fb2cf3ffc6884cca9b9cbf5ae083e87eacd07216df10051a7072cc27a5
SHA512
d5b8cd0c5e3dead6c74c47885f8345c90398b4a3b471474e91e010858f8402e700d8c0981f44b1c04045870675cd91fe23b5827fc544d49c2b46e818be07960a
SSDEEP
1536:g0qiQWEVy27b0RJOT6wdEiHCj/GV/1uR/040:Bmg27b0LtlAV/1uRs40
resource | yara_rule |
---|---|
sample | modiloader_stage2 |
Checks for missing Authenticode signature.
resource |
---|
e0edd9270b9f1db50b0bf64eac5bc0ff_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
MyHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ