DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
_EntryPoint@16
Behavioral task
behavioral1
Sample
ad4a67c5e9e6b0bfc4ce6e43a118458f_JaffaCakes118.dll
Resource
win7-20240708-en
Target
ad4a67c5e9e6b0bfc4ce6e43a118458f_JaffaCakes118
Size
492KB
MD5
ad4a67c5e9e6b0bfc4ce6e43a118458f
SHA1
22ac3b1c4b6eb9e6f53d34b2e56db7b60bd5b944
SHA256
1ee78234858a779357fa39cd216b0c433bc0526a7e674eaf2d42f7f5e20871d9
SHA512
827280fe8343dafb1b0ecd5ba97e3fa90d4b824941f4ad346bd9bef460fcb7102ad7d4324d94b766a1c7ba2d0b21286d72708507d810153c864f92bc4545b6b5
SSDEEP
12288:Ol+C4ber5jO5hSRFeIEGpzK6FSkFvQ1ZslH4yq4:i+JberUUx5pzv0alH4yJ
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
ad4a67c5e9e6b0bfc4ce6e43a118458f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
_EntryPoint@16
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE