Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
Behavioral task
behavioral1
Sample
38898d93f7a9dfa8a0ef9c6f622cdb08_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
38898d93f7a9dfa8a0ef9c6f622cdb08_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
38898d93f7a9dfa8a0ef9c6f622cdb08_JaffaCakes118
Size
26KB
MD5
38898d93f7a9dfa8a0ef9c6f622cdb08
SHA1
06f09d3f682f6359f8b6221888a25d6a7cabb782
SHA256
eb16d63e1f64fa241e0069c34e840a214ffbec87f981338b2bdd7964b4124e80
SHA512
078d006e079b0c2a37259526c906455b1f238b315a445a305fe6a49366377ee12ab78125ae1def4797e8109ada7ae19247b43ce46bce3c78ac89c9ab84531a2c
SSDEEP
384:JXFDpfdDEmNb2QGG+AxSHZVnd8jh6RLL18:frEmN6QSndbLG
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
38898d93f7a9dfa8a0ef9c6f622cdb08_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ