SetMyHook
UnMyHook
jksHook
jtzHook
Behavioral task
behavioral1
Sample
1c2ff14bcd6501e2453d204bc3b1bb32_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1c2ff14bcd6501e2453d204bc3b1bb32_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
1c2ff14bcd6501e2453d204bc3b1bb32_JaffaCakes118
Size
19KB
MD5
1c2ff14bcd6501e2453d204bc3b1bb32
SHA1
7e12ceb74dca713012d118817df4e19ada89d03e
SHA256
cea05240223e191bd1586ab8d00b9fc23b5272adcd2a3a8eb7cc4c89c8e821bd
SHA512
30a7ecf89185f3e64079921b4a4b28511be0d77816098998e46036ba63d69f01a1c01519531ad92e28655e33e94acea31f74443ab146a374ced52c5ffdeae4c3
SSDEEP
384:du6/ewRBSLlY/HSBT9Ujm1wsmJ3NfLKQuuuyfofoPX:duo7SLsHSBT9UqmDf9fuVw
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
1c2ff14bcd6501e2453d204bc3b1bb32_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SetMyHook
UnMyHook
jksHook
jtzHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ