DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
XFlash
Behavioral task
behavioral1
Sample
33b18888faffaa4c145d8cf7ac28ad14_JaffaCakes118.dll
Resource
win7-20240704-en
Target
33b18888faffaa4c145d8cf7ac28ad14_JaffaCakes118
Size
446KB
MD5
33b18888faffaa4c145d8cf7ac28ad14
SHA1
37b6463edae29a732a06775a050344783e40faba
SHA256
bd01a31aba74f9e1b3421b7ece68b496a308eaa61d767c912756a03005e402e4
SHA512
dd6aef880e11f83a5b67f3f5a7daf8d02d410c3084f473a7b8dcd63fa71c65abd255715db0cc0570a958850541cc081c98923a00687dc48b73ccee459d318326
SSDEEP
12288:tUcknMphBkTiC044FkXevQv2k6eWYWFDQKba:tUcknMpC104kM9v20WYWVQKba
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
33b18888faffaa4c145d8cf7ac28ad14_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
XFlash
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE