DllCanUnloadNow
DllGetClassObject
inject
Behavioral task
behavioral1
Sample
402e214ea3dc0f47338297c59d27fc0e_JaffaCakes118.dll
Resource
win7-20240704-en
Target
402e214ea3dc0f47338297c59d27fc0e_JaffaCakes118
Size
63KB
MD5
402e214ea3dc0f47338297c59d27fc0e
SHA1
afa329a29d649a07a2f24b5ff0770e4b41bd1441
SHA256
31fe6c1915412e5134efd501543732c5421dd089ea3e79ff2c9b19c048f38ff2
SHA512
5853b7e8dba0ef61374e538781197199cf86fa72bf0f3761aa2765677d9800f559e1c6f1505e8356ad951da7fdc1c168d91ee51e8763d9b0c3058ab0e93ff07e
SSDEEP
768:nHpI5EBmwLXHN6RRHHdB+BmHY97o014/89GH4X6Mgd90YQFO6ZXsSKhAUlxSoLs:nJIMlt6RRdOm214/hVh4KhHnZY
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
402e214ea3dc0f47338297c59d27fc0e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
inject
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE