DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
f04a2e3a113ee4dcb43f1b8f54130fce_JaffaCakes118.dll
Resource
win7-20240903-en
Target
f04a2e3a113ee4dcb43f1b8f54130fce_JaffaCakes118
Size
158KB
MD5
f04a2e3a113ee4dcb43f1b8f54130fce
SHA1
df172fb259cf74b98a4507e708223a6e1b4d5f36
SHA256
9e355ebbac6b249350549565790d69a5e08d0a1b89ca4045d83fe27726dcee68
SHA512
26cbe42c86d41e09f8147c4538351f91d00137d3f0583d903f9979d322be97f976bf725c5263eca9b83348ddc070dfc6111e5e4cde8fac856ad58484ca1db562
SSDEEP
3072:RUo1ije7HSjSMOt332bbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVU7fDCrlNi:Cj2HSnQ34wvP6bQ7yMP+DE827fYlg
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
f04a2e3a113ee4dcb43f1b8f54130fce_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE