_AcptParam
_AutoRun
_ClientInit
_GetWnd
_HideWnd
_Info
_InstWnd
_ServerInit
_Uninstall
Behavioral task
behavioral1
Sample
ec382c57001b35e48151529d8cc0dde3_JaffaCakes118.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
ec382c57001b35e48151529d8cc0dde3_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
ec382c57001b35e48151529d8cc0dde3_JaffaCakes118
Size
12KB
MD5
ec382c57001b35e48151529d8cc0dde3
SHA1
5ec1e276e1d153fa5a7e5183a3b5117bd3b3698f
SHA256
62c36420adb0a50bf1cc0bfd70fb18f236729e3059d495bba70afa1e0319436e
SHA512
6ce81db37865e047875d6f56794c9d5141595e8db4d5683fb2a3ac04220e822d6c23226c169d80d66bc44dc4f2274fb0345e54dcff0e49a474c7dc14be4b87a6
SSDEEP
192:Rhkw7AIZCosg5PKvBqdMx+ooopk/Xc0BX69tUvvP6C56i0nfQhpW:7r8IZrsAPqwhopWxX69aHP6Cgi0fP
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
ec382c57001b35e48151529d8cc0dde3_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_AcptParam
_AutoRun
_ClientInit
_GetWnd
_HideWnd
_Info
_InstWnd
_ServerInit
_Uninstall
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ