DllCanUnloadNow
DllGetClassObject
inject
Behavioral task
behavioral1
Sample
5cf9b82ec3ea802829c393941bfaeb4a_JaffaCakes118.dll
Resource
win7-20240708-en
Target
5cf9b82ec3ea802829c393941bfaeb4a_JaffaCakes118
Size
63KB
MD5
5cf9b82ec3ea802829c393941bfaeb4a
SHA1
2997180c698a8858b11f909ef6f245c3648e149a
SHA256
dda3737c9e88592f91609adde9cdb187bfa67c784d43bc3d8d3241e6dc2017d6
SHA512
80424190dc2005de0ba8c4ced6bdc07fd6f1102a656d0efe35182d135fe5baedfb035fe3043fd6388d6601b2eeec42e42bd54f13f033e49faa83022a23333970
SSDEEP
768:nHpI5EBmwLXHN6RRHHdB+BmHY97o014/89GH4X6Mgd90YQFO6ZXsSKhAUlxSoLO:nJIMlt6RRdOm214/hVh4KhHnZ6
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
5cf9b82ec3ea802829c393941bfaeb4a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
inject
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE