StartHook2
StopHook2
Behavioral task
behavioral1
Sample
0f84e98f1080e2cd53a24fb016e3a3c7_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0f84e98f1080e2cd53a24fb016e3a3c7_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
0f84e98f1080e2cd53a24fb016e3a3c7_JaffaCakes118
Size
21KB
MD5
0f84e98f1080e2cd53a24fb016e3a3c7
SHA1
0ab7f4ea2a904d3b1b6609a7cb31cc63da528f93
SHA256
83d2ef66ea01556ef0b31301b81473cdb0ddead9522355d93c4ac027e49c730b
SHA512
5b42c3be6c4c8db8600de5e7854b545195e59f6e0f3ab90199629b07572bcd838bf97afaf396d5ed9a3a61be2b69419380e811e79421678769c5d03f32dee073
SSDEEP
384:kkAVgeBCgqlg0Zy4UuZJvm7Td1lu02vGSDNTrOrBg35H//Y/8Yy4V:kkcxAlgsy4UuZk7Td1ge2Ors5H//YkG
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
0f84e98f1080e2cd53a24fb016e3a3c7_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
StartHook2
StopHook2
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ