PlgDestroy
PlgGetDirectLink
PlgInit
Behavioral task
behavioral1
Sample
187ed3753719046c36addd9d19027651_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
187ed3753719046c36addd9d19027651_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
187ed3753719046c36addd9d19027651_JaffaCakes118
Size
32KB
MD5
187ed3753719046c36addd9d19027651
SHA1
db08df1e0c423aaef64f83e0cbb67b199c2e2c72
SHA256
ca7c601fb3bba6669934458f92a09b9a74a34994818b638afb0df2a3716df25a
SHA512
e263a3c7cbce6829d3fa29beb56b832f8a08dad371e6b7265f262dd96a9375cd515791804c6d2b54eb62a93dcd02b4a6ebb57c712e5cb83da9618b69704db83b
SSDEEP
768:5/KqzMOqtdHwqnBDv+BNUHPd8cU+bERdi:5SNPXVHl8LjRdi
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
187ed3753719046c36addd9d19027651_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
PlgDestroy
PlgGetDirectLink
PlgInit
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ