DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
a860d704972ba620f713987840e2b3f9_JaffaCakes118.dll
Resource
win7-20240704-en
Target
a860d704972ba620f713987840e2b3f9_JaffaCakes118
Size
503KB
MD5
a860d704972ba620f713987840e2b3f9
SHA1
aa62c0657109492c43eb69f9f1235b221d2b917e
SHA256
a0cd3d64266756266d1c67c53be81e9692a9f820532014864690ae0103e1c4eb
SHA512
19442d3878391310a06a01211696d32133cace7ab6b9ca4f8999649bc7a5d19050bf27da33ac3bc627ff936578fed5e2929a7eb61005f16b727922993dcb924c
SSDEEP
6144:rszCW7shidQ/kwbOBEYl7ljxNPhJMulIJmpblFdb081wUijKT0:ozCWYhwvhV8ujpJFdb0ow+T
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
a860d704972ba620f713987840e2b3f9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE