DllCanUnloadNow
DllGetClassObject
a
Behavioral task
behavioral1
Sample
0f14ce87481fed608542773200ed1873_JaffaCakes118.dll
Resource
win7-20240221-en
Target
0f14ce87481fed608542773200ed1873_JaffaCakes118
Size
70KB
MD5
0f14ce87481fed608542773200ed1873
SHA1
8bd4b26a29966dbdc3f6d77a3677866899559d2c
SHA256
1d0def3f66660bd14611bce47aebe37371e766045e19f07b186800e3a58f254e
SHA512
5714bba64e9a0f7ad37de107d0516c8cd18fa2b51cd154b6d0439746cc3ab47c2df935af73181136b42d8a2433242d686bea0d237ff08f476def96f84c2b59ff
SSDEEP
1536:ChtPJ3RnQBCOKKiOs/T0uu9aQTmULihRgwM9meiKCrdRX/:O15QBXKKin1uD9CrdRX/
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
0f14ce87481fed608542773200ed1873_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
a
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ