DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
TestFunc
Behavioral task
behavioral1
Sample
b6f3c0944de90a81c4043d8f616b85c7_JaffaCakes118.dll
Resource
win7-20240708-en
Target
b6f3c0944de90a81c4043d8f616b85c7_JaffaCakes118
Size
17KB
MD5
b6f3c0944de90a81c4043d8f616b85c7
SHA1
576824ff1cf9fd25c63a2324a44808ee1ffe4230
SHA256
6bd7973e7279400c78cbe36ccc712b1f0c00c73453ee3b18c0a21b85dd1edd93
SHA512
9fc37bfe4c9748615815d9d273d77652ca07737150e8944f24b3cec0a610f5781f2d67739e748b4d411228449cdaeeff7d6bef24c5fd956a893d0ada3893234f
SSDEEP
384:emXHm11tlzfjpkYH4UM3BOeBwgBHsLh6kcK5eF:e0m/jzyYYUqLdKwF
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
b6f3c0944de90a81c4043d8f616b85c7_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
TestFunc
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ