DllCanUnloadNow
DllGetClassObject
inject
Behavioral task
behavioral1
Sample
455d8bf713e6520c1f1cf936e7defd4e_JaffaCakes118.dll
Resource
win7-20240705-en
Target
455d8bf713e6520c1f1cf936e7defd4e_JaffaCakes118
Size
63KB
MD5
455d8bf713e6520c1f1cf936e7defd4e
SHA1
192725de77ffe45e1af02a664997a790abefbd90
SHA256
e4b02b4c0d8fd8f136a8e29c41a0511e993c918bad3c9c43ddcabb97ae1c76dd
SHA512
78b48f3a4513a9c493d40c51adc88de389ba7b45ce222daf7841dbb53dc44d5e3531c1b270bb9dbdce40ba05520a0c6d83c9b650b2137c22595995e6856a9245
SSDEEP
768:nHpI5EBmwLXHN6RRHHdB+BmHY97o014/89GH4X6Mgd90YQFO6ZXsSKhAUlxSoLr:nJIMlt6RRdOm214/hVh4KhHnZ3
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
455d8bf713e6520c1f1cf936e7defd4e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
inject
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE