DllCanUnloadNow
DllGetClassObject
inject
Behavioral task
behavioral1
Sample
8d89124241a5a36cee099f23d94ae75b_JaffaCakes118.dll
Resource
win7-20240704-en
Target
8d89124241a5a36cee099f23d94ae75b_JaffaCakes118
Size
68KB
MD5
8d89124241a5a36cee099f23d94ae75b
SHA1
852095dc50d892f2f5d257b615a823f84e96ae5b
SHA256
a234608d6585a9ab3e22ca94c7dd54f9196885cfb89b4f0135b510a82b92ccb1
SHA512
3ed065682159bd7890bb2071d1e75a14b8f2578ced97526ce5aea55436a9844adaed189f6c69af6fa399a2d9437ec72dc640f24b7ee920de699b4d0c17920767
SSDEEP
768:nHpI5EBmwLXHN6RRHHdB+BmHY97o014/89GH4X6Mgd90YQFO6ZXsSKhAUlxSoLz:nJIMlt6RRdOm214/hVh4KhHnZf
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
8d89124241a5a36cee099f23d94ae75b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
inject
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE