DllCanUnloadNow
DllGetClassObject
setup
Behavioral task
behavioral1
Sample
e0a1bcbe4ce22260e2c929ac3f1a90d4_JaffaCakes118.dll
Resource
win7-20240903-en
Target
e0a1bcbe4ce22260e2c929ac3f1a90d4_JaffaCakes118
Size
48KB
MD5
e0a1bcbe4ce22260e2c929ac3f1a90d4
SHA1
3a8eb5c8afa5a264909cf7e216b9bcd38feeb449
SHA256
525d4fe84395b62dfe465e6a46a8cb5ad1522dd4583ff727a90097ed60fede04
SHA512
72bf33f90b2d3f424b62664346312b9725cfedd29a28a970f50d6e37b8edddf11371d3c691dc9ad40e560590bef49ded54b219fe30aa1a45df71fba93feef4de
SSDEEP
768:toqNYVwh0nBrM+QB6LrxlhAlBKWtrK1LDGpbFntQ3wNf8:tzKBrM+OoqTKR1GpbFntQgN0
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
e0a1bcbe4ce22260e2c929ac3f1a90d4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
setup
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE