_GetResult
_InstallMouseHook
_SetServer
___CPPdebugHook
Overview
overview
7Static
static
7493525795/...ord.js
windows7-x64
3493525795/...ord.js
windows10-2004-x64
3493525795/...Pwd.js
windows7-x64
3493525795/...Pwd.js
windows10-2004-x64
3493525795/...ok.dll
windows7-x64
1493525795/...ok.dll
windows10-2004-x64
1493525795/Out/Pwd.exe
windows7-x64
1493525795/Out/Pwd.exe
windows10-2004-x64
1493525795/...rd.exe
windows7-x64
1493525795/...rd.exe
windows10-2004-x64
1493525795/Pwd/Pwd.js
windows7-x64
3493525795/Pwd/Pwd.js
windows10-2004-x64
3Behavioral task
behavioral1
Sample
493525795/App/ReadPassword.js
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
493525795/App/ReadPassword.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
493525795/App/fReadPwd.js
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
493525795/App/fReadPwd.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
493525795/Out/MouseHook.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
493525795/Out/MouseHook.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
493525795/Out/Pwd.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
493525795/Out/Pwd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
493525795/Out/ReadPassword.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
493525795/Out/ReadPassword.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
493525795/Pwd/Pwd.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
493525795/Pwd/Pwd.js
Resource
win10v2004-20240226-en
Target
14c10c881f096fa6b77379b72aba5b79_JaffaCakes118
Size
393KB
MD5
14c10c881f096fa6b77379b72aba5b79
SHA1
ac6782655bf9d4bce9869529e88de8f5e088cb16
SHA256
49e9f046b73e76248a82724038323dbd600efaf7f7088b7d5b7cb22fe70652f1
SHA512
af46e8a1758035b332461f7c2fc9f3a58d871d39ad37e34bdaf3bc23762dba5a3dffb36333d8bd68d0652b9b11cd59be3f46bc961f70b8074440a9d1744e5703
SSDEEP
6144:qnw8N8fbtsavok90uFnpvdAeKMJN9JJGzCo8xwWZHQF5YTG+sy2BVSP+Q55W5Xe:qwp3F0up1HKoNHszCpxZHE5Y3245W5Xe
resource | yara_rule |
---|---|
static1/unpack001/493525795/Out/Pwd.exe | aspack_v212_v242 |
static1/unpack001/493525795/Out/ReadPassword.exe | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
unpack001/493525795/Out/MouseHook.dll |
unpack001/493525795/Out/Pwd.exe |
unpack001/493525795/Out/ReadPassword.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
GetCurrentProcessId
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetVersion
HeapAlloc
HeapFree
LoadLibraryA
CallNextHookEx
PostMessageA
SendMessageA
SetWindowsHookExA
UnhookWindowsHookEx
WindowFromPoint
@_InitTermAndUnexPtrs$qv
__ErrorExit
__ErrorMessage
___CRTL_MEM_UseBorMM
___CRTL_TLS_Alloc
___CRTL_TLS_ExitThread
___CRTL_TLS_Free
___CRTL_TLS_GetValue
___CRTL_TLS_InitThread
___CRTL_TLS_SetValue
__argv_default_expand
__free_heaps
__handle_exitargv
__handle_setargv
__handle_wexitargv
__handle_wsetargv
__startupd
__wargv_default_expand
_memcpy
_GetResult
_InstallMouseHook
_SetServer
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
@@Fpwd@Finalize
@@Fpwd@Initialize
__GetExceptDLLinfo
___CPPdebugHook
_fmPwd
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
@@Freadpwd@Finalize
@@Freadpwd@Initialize
__GetExceptDLLinfo
___CPPdebugHook
_fmReadPwd
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE