DllCanUnloadNow
DllGetClassObject
go
setvm
Behavioral task
behavioral1
Sample
adaace4160075f3a401166bb774567c2_JaffaCakes118.dll
Resource
win7-20240729-en
Target
adaace4160075f3a401166bb774567c2_JaffaCakes118
Size
118KB
MD5
adaace4160075f3a401166bb774567c2
SHA1
090ee24709adecc0711d213574210cf2557066df
SHA256
8f1b448966819b79d9c9d8e5d2085a4b5c0797a949d10cd6d4a307e20a285ac0
SHA512
671a993aefb50652226ec0ffc6232f6c817f69dbc3af4a36b751c9331f05fb7310f9102ba66679b76b2d1935f62ec17e565820bde0f56975ff20c7eb56d7e203
SSDEEP
3072:CPTZPU9Ae3bn7lfPvMP+IKRp7CdaKH6gQMiiqE:kTZPU6kb7l3vMKz7yBavpc
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
adaace4160075f3a401166bb774567c2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
go
setvm
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ