Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
Behavioral task
behavioral1
Sample
01e6754dd3cad29ed5986fe078a68f4a_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
01e6754dd3cad29ed5986fe078a68f4a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
01e6754dd3cad29ed5986fe078a68f4a_JaffaCakes118
Size
22KB
MD5
01e6754dd3cad29ed5986fe078a68f4a
SHA1
98b012e0b6df8b2f0fca5cc9f8f5aaf12f836719
SHA256
0a1104db4a0d8666402a15896318a3090990e1ea066b98d93f145f80a86848f6
SHA512
ff9ec8ad8abcab1d13fefdd9d81c4d492b33ef4743155ae9307ebe011cc6d2b0a9bcd6134711b52b38c4c2684c7ad821aad48462b979d7a8fc3c70daff9eca3e
SSDEEP
384:wR35iNa6k0Da8KvPsIs6VaMXjc3NJ7bzPZkwr0DrVOR07e:i5mcVncdJ7XP+wYrVaf
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
01e6754dd3cad29ed5986fe078a68f4a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE