_Agent_OnLoad@12
_Agent_OnUnload@4
_java_crw_demo@76
_java_crw_demo_classname@12
Behavioral task
behavioral1
Sample
0f37ec83239182c2ab3a442317da3e6d_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0f37ec83239182c2ab3a442317da3e6d_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
0f37ec83239182c2ab3a442317da3e6d_JaffaCakes118
Size
14KB
MD5
0f37ec83239182c2ab3a442317da3e6d
SHA1
6b3fc7663eaf4d84361325eeed595398ef335fd9
SHA256
ea6bb60718533159bcb42cf82f88212b1b0e1d10a6a18356c0bb92f3af6b3658
SHA512
5f1491dc9a4e5abdf86c40e5b65ac447afa7432f2ce95e405f2567778a3cfb2206fe9fa1acf899457cf7ab2cc9e3d84571abb2d1bed6f29881104d8136ec53a4
SSDEEP
384:E2eiTVganwoVGjr2L3pkMXJiSoeL3qZI0dETDAZH:E2ik2r2N3XJiSbWIp
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
0f37ec83239182c2ab3a442317da3e6d_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_Agent_OnLoad@12
_Agent_OnUnload@4
_java_crw_demo@76
_java_crw_demo_classname@12
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ