DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Gbieh
SpecialFunction
Behavioral task
behavioral1
Sample
0234ff424adc84564c09d4bf12c637c4_JaffaCakes118.dll
Resource
win7-20240221-en
Target
0234ff424adc84564c09d4bf12c637c4_JaffaCakes118
Size
755KB
MD5
0234ff424adc84564c09d4bf12c637c4
SHA1
508b561f259ae41f161efa46083fa9781c738c35
SHA256
31d278009f858fbb89476c9f689677010070902072fc5376857278c573cd8127
SHA512
687a1d02ebb3482550f076fc6ab98293c7611e41c1475e3ee84abd2538e0961635029ba0e373dc792231425fe5b34e2f4259dd66a61ad4c09d30ba4e820fd749
SSDEEP
12288:uLozFoYl5OJ4KX1rFBVoP9x+0m5Wsr3SgyXIKcOzN+IldpxvhvviFbJgdm8TIxAo:uUJoYuJVfBy/+0JsZKcyrpxvh1UdOAuY
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
0234ff424adc84564c09d4bf12c637c4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Gbieh
SpecialFunction
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE