DllCanUnloadNow
DllGetClassObject
inject
Behavioral task
behavioral1
Sample
375e79c89b009d281e5e98e817930fa7_JaffaCakes118.dll
Resource
win7-20240704-en
Target
375e79c89b009d281e5e98e817930fa7_JaffaCakes118
Size
63KB
MD5
375e79c89b009d281e5e98e817930fa7
SHA1
0f1c3ed5a3e090eb73c9ce182149dd95f7d80dcf
SHA256
213bf44f481f5796f3a2549132f408998efd92a051f82cd330612b59c2aa33d9
SHA512
685d9db6baf8b8629e347734c4e55127678bd3fa39981818e7c731622472ce9b818da3941e27b5aea87aed21960c615595dffb03bb195b5a73bbb8fb49c43902
SSDEEP
768:nHpI5EBmwLXHN6RRHHdB+BmHY97o014/89GH4X6Mgd90YQFO6ZXsSKhAUlxSoL3:nJIMlt6RRdOm214/hVh4KhHnZr
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
375e79c89b009d281e5e98e817930fa7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
inject
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE