DllCanUnloadNow
DllGetClassObject
rundll
Behavioral task
behavioral1
Sample
b59d88e54b07f26212e99fb4f2581039_JaffaCakes118.dll
Resource
win7-20240705-en
Target
b59d88e54b07f26212e99fb4f2581039_JaffaCakes118
Size
49KB
MD5
b59d88e54b07f26212e99fb4f2581039
SHA1
511ae57cc6d89d9fa9fca42b33dfc8467a69da27
SHA256
a413feb23cd5d8ff19b4df8aa8fbb5a8ec4874c75cadc3f06016a31b542824bb
SHA512
682a3824d9dd57f83189e43124f9f63a2f47352033991ddc984ab56e7169c7f6f85926240c27c2984364fcc7b507240d362dccdd41edfb8ad3b735a8d912280c
SSDEEP
768:qXxSxs2rslXxYxQcZDCZvyYEc7UtRX6rouUA0KrnCkwYHT:q+sEsP+ZDaDKJMPB0mn4KT
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
b59d88e54b07f26212e99fb4f2581039_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
rundll
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE