StartHook2
StopHook2
Behavioral task
behavioral1
Sample
f367a537ef93c153ee79045330586964_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f367a537ef93c153ee79045330586964_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f367a537ef93c153ee79045330586964_JaffaCakes118
Size
21KB
MD5
f367a537ef93c153ee79045330586964
SHA1
3e48c4a9c942b799a24860be2af8a888323daa7d
SHA256
518eee7f3007065d9890ae6700e84cac672b5ddb8a4fd2e72afca1c658a096f1
SHA512
b467602e965d5372ffb55da1429c12b02240c67e7671bda82d724e4ea0e0c9124c082b6809ce0f97daa3d80f468309b1f3a13d1f0d8a9388a683059aaa2336ef
SSDEEP
384:fkAVgeBCgqlgAnPGVYG4sO/1Hl9tG7bJuWej/cWBQi:fkcxAlg+PNG4sGN4bJQj/h
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
f367a537ef93c153ee79045330586964_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
StartHook2
StopHook2
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ