DllCanUnloadNow
DllGetClassObject
Nkncklk
DllMain
DllRegisterServer
DllUnregisterServer
ServiceMain
Behavioral task
behavioral1
Sample
1625150b0f5d799a6f0b43bccdb6cc4b_JaffaCakes118.dll
Resource
win7-20240903-en
Target
1625150b0f5d799a6f0b43bccdb6cc4b_JaffaCakes118
Size
216KB
MD5
1625150b0f5d799a6f0b43bccdb6cc4b
SHA1
a542e9de16c87a9f0b86a81746a6f31f6ecc6544
SHA256
fc1e66656caba6f2119fa62fe4f81342c67aac232bddb70f07bea126e661cd6d
SHA512
d201931f392be4f4c3517c459af22f3ce93c2186ce415a02693c37ab99e2b7ea9176ea96ff6e622755e8f89e42bbc6ab3250f3a0401460aee70cd705ca28d687
SSDEEP
6144:bhrl1NWPLfVYF3xqEhNR7mYd+Y2oS2OgX:3jWjVymYotoS2V
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
1625150b0f5d799a6f0b43bccdb6cc4b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
Nkncklk
DllMain
DllRegisterServer
DllUnregisterServer
ServiceMain
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE