HookOff
HookOn
Behavioral task
behavioral1
Sample
bbd8fd73d87344ca862ad5af531a41c2_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bbd8fd73d87344ca862ad5af531a41c2_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
bbd8fd73d87344ca862ad5af531a41c2_JaffaCakes118
Size
45KB
MD5
bbd8fd73d87344ca862ad5af531a41c2
SHA1
85fab079e9ff7af5a5c7183e59f734c36c24482d
SHA256
12d1a650acaa33ea3e53ef087ba24d62d17ce021783fc395f22aaafee5e7e8fb
SHA512
94f4372c72b431c453540001d54e8e2066aa1b1fe78a3f2120f9ca74a3fd60c46479ff9b6c48fb407df0ad2147a3d348384b118154bab553ad493427dce55111
SSDEEP
768:Xy5qsmQpwyQNbGofdT3wRx90TuqvnU0EXXPZxcG0k4LhAXzZe5TtK:i5qsmQWVFTg2ThEnPu6Fe5RK
resource | yara_rule |
---|---|
sample | modiloader_stage2 |
Checks for missing Authenticode signature.
resource |
---|
bbd8fd73d87344ca862ad5af531a41c2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
HookOff
HookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ