DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
a4be010a0d102fcc53f200799742d87e_JaffaCakes118.dll
Resource
win7-20240704-en
Target
a4be010a0d102fcc53f200799742d87e_JaffaCakes118
Size
191KB
MD5
a4be010a0d102fcc53f200799742d87e
SHA1
3ec12d2ed8c6e29ac66d17a8f3dbd26f1bf88b52
SHA256
1a6cb026b4baa7764941ee4dc4c9dbacf637242787c65abc871f8f8b13a47353
SHA512
7e2bbeddb839f6e2980a2d651b2ded2661d258a8ba5896e8698e2330b8195fa0927bc7398d735af4b23ee9e90c737baf5293dd6fa2652017fcb7d921a930a2d7
SSDEEP
3072:bik5GxsK1h3sseoEK0FoynFUdSuLisw16MsjRDoILg5GPdIgqtAsL3DYcZ6Qv:b95MsK1IKAoyFUdj2r16fjR3LgaDsTES
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
a4be010a0d102fcc53f200799742d87e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE