StartHook2
StopHook2
Behavioral task
behavioral1
Sample
f42a8e864f857a333744d86c552319fd_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f42a8e864f857a333744d86c552319fd_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f42a8e864f857a333744d86c552319fd_JaffaCakes118
Size
20KB
MD5
f42a8e864f857a333744d86c552319fd
SHA1
907e5c85bc41ff5e748fedc603b1aec91e08dc23
SHA256
5cc90ad57c1cb8591434b9ee032de5aba55f3134f3df2cbb6e55fb5bccb5ab16
SHA512
b6cb0ec6f67e4b3f377d886807da6c74eb72edc9494508f3fd598e68cd55762acab4a6dc36d6550921fb5dc877c75a5e2ccfa99738b8045fb4578e61681285bc
SSDEEP
384:wkAVgeBCgqlgJQ30tr/6U0LBtF39L8SdUkdwg:wkcxAlgJQUlq9hUk5
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
f42a8e864f857a333744d86c552319fd_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
StartHook2
StopHook2
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ