DllCanUnloadNow
DllGetClassObject
inject
Behavioral task
behavioral1
Sample
41271f036a4efbb9ab0652158f293718_JaffaCakes118.dll
Resource
win7-20240705-en
Target
41271f036a4efbb9ab0652158f293718_JaffaCakes118
Size
63KB
MD5
41271f036a4efbb9ab0652158f293718
SHA1
dfe8bc508b041931ee6fb0fc860d10bdca893ff2
SHA256
19dc8459abba4544722d2e92a22cde915e5ce34ce2c661400489c7d075f176c5
SHA512
af73d5f1bd2b55103b52dbf3d38007874aa2b70bdd280fa7aaea7d27586fb181564f2f2109a9bfc8081090bb0d4b9363d6d88a878b75c39113812d6992d5bfba
SSDEEP
768:nHpI5EBmwLXHN6RRHHdB+BmHY97o014/89GH4X6Mgd90YQFO6ZXsSKhAUlxSoL5:nJIMlt6RRdOm214/hVh4KhHnZF
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
41271f036a4efbb9ab0652158f293718_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
inject
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE