HookOff
HookOn
��kk��e�>�I %�Y�qԊ^�k��FJp���R�w��5�f����
Behavioral task
behavioral1
Sample
3b6ef4151dbb8fb30fc62618a1805508_JaffaCakes118.dll
Resource
win7-20240708-en
Target
3b6ef4151dbb8fb30fc62618a1805508_JaffaCakes118
Size
22KB
MD5
3b6ef4151dbb8fb30fc62618a1805508
SHA1
716c9eebd0a8f24b83e7bfc2dc8ad486f4fc09c2
SHA256
aa4d7a3f2e4ce2380f0508f705c92306d55240987c106947c58cc60312e91c9a
SHA512
5b0571e23af73bf31bad0f91e5a5cf9221151e9c09f727d7d0cd12f789a8662c02a1d127d8c52c5aa9fc8ec890ce5ad82c8e8c5eb108eb4b6e61edd7008ba1cf
SSDEEP
384:bg9kxlo+34MrGvFVTF4Kci5ItKiSvlFAggq2fpFhBSDJ6LYEZGjSV2eD:Zlpzq3TF4WimMg87CQYE2SV2M
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
3b6ef4151dbb8fb30fc62618a1805508_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
GetModuleHandleA
LoadLibraryA
GetProcAddress
HookOff
HookOn
��kk��e�>�I %�Y�qԊ^�k��FJp���R�w��5�f����
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE