DllCanUnloadNow
DllGetClassObject
inject
Behavioral task
behavioral1
Sample
39c4a82b9b97ed4c251472c8316c8b89_JaffaCakes118.dll
Resource
win7-20240705-en
Target
39c4a82b9b97ed4c251472c8316c8b89_JaffaCakes118
Size
63KB
MD5
39c4a82b9b97ed4c251472c8316c8b89
SHA1
6e43c999376929216bc43b3b4fd57895741bf6fc
SHA256
508752d3c8f8d82a547bf981dd2ea572acbe46f141bfd231bd4f0fbd168a19c4
SHA512
7f7229309f2bc20a0947de55220f7fc9f27c65c8b8f0cd3b0fd8c706d0282f9b248e6c146678d2fb76079605b79c78c91cd00f497f48a1c520f4c152816218d4
SSDEEP
768:nHpI5EBmwLXHN6RRHHdB+BmHY97o014/89GH4X6Mgd90YQFO6ZXsSKhAUlxSoLA:nJIMlt6RRdOm214/hVh4KhHnZ0
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
39c4a82b9b97ed4c251472c8316c8b89_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
inject
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE