DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
2de4ddaa6f589c6aa84e71a8289abd78_JaffaCakes118.dll
Resource
win7-20240708-en
Target
2de4ddaa6f589c6aa84e71a8289abd78_JaffaCakes118
Size
102KB
MD5
2de4ddaa6f589c6aa84e71a8289abd78
SHA1
0041d979c206e218a4ffc7fc36d889822dbfbc33
SHA256
a19327ce1682fcc367ba2d04c5f9fa4fa75180b1d820b8cacac2a0254081d4f2
SHA512
0930e4dad81b8cbb6e73629cbf1ba10a2642b30501765f6d28581ce5956398be032c743e1f71ca517a9c996850d70afc73105f2c28e5051c99a8937e798449fb
SSDEEP
1536:DBFy58oS9YCvnFsgpxbZlA5VOM6lIx5ihgE58:1FyJxkFsUVdlIx5jR
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
2de4ddaa6f589c6aa84e71a8289abd78_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE