DllCanUnloadNow
DllGetClassObject
inject
Behavioral task
behavioral1
Sample
b1d3d8ab1a71d5d94706ccc30db841f2_JaffaCakes118.dll
Resource
win7-20240705-en
Target
b1d3d8ab1a71d5d94706ccc30db841f2_JaffaCakes118
Size
63KB
MD5
b1d3d8ab1a71d5d94706ccc30db841f2
SHA1
c9b305fa255bba6a7048ebff9f7df110da386e57
SHA256
04b9512903900486c64f0e1abe610e496fd71876fd425cab7a1ddcefccac664c
SHA512
1bcb22816c19a6fe944571f0f2d0bb4a288b0366d14700be821de119c8dbf0f98c8532be4e9bb38aa31005fabfd94cf8bb38e80d4da3bc7d1474c054358f79b8
SSDEEP
768:nHpI5EBmwLXHN6RRHHdB+BmHY97o014/89GH4X6Mgd90YQFO6ZXsSKhAUlxSoLj:nJIMlt6RRdOm214/hVh4KhHnZ3
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
b1d3d8ab1a71d5d94706ccc30db841f2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
inject
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE