DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
ae02e212a22bb83376302e5625acc1e4_JaffaCakes118.dll
Resource
win7-20240704-en
Target
ae02e212a22bb83376302e5625acc1e4_JaffaCakes118
Size
85KB
MD5
ae02e212a22bb83376302e5625acc1e4
SHA1
f23526ad5f0999e4ad1a7ba4d7ebe888f68b09e8
SHA256
75c1dca933a1d2a5a841f2720e30fb4dd01c692def44b49f5350b9fa2fe8bfc4
SHA512
83db3c95e8a7bdd98a61bb2542690875a72cc717165ef81aa6df3abfaf5e11f90939076ebf37c37573200f8969633389da1d0f02ba7b616de9b893ab6552b3bc
SSDEEP
768:iJal/8ohTj7Irb2rkDPrXpAbbJbYCc0bVB18ibvC1Kf1NS2lsNYpdljuVT7l5VwD:42xK2APrXKbfJRX8ib6A1vlsQlAT7R
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
ae02e212a22bb83376302e5625acc1e4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE