?ADME@@YAHK@Z
?ENg1@@YAHK@Z
?RunFather@@YAHK@Z
?RunMe@@YAHK@Z
KillOld
SetHook
runform
testform
Behavioral task
behavioral1
Sample
229981d5759f7facba8ae3d31b29937f_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
229981d5759f7facba8ae3d31b29937f_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
229981d5759f7facba8ae3d31b29937f_JaffaCakes118
Size
62KB
MD5
229981d5759f7facba8ae3d31b29937f
SHA1
a2f6fe4b64bea3204c73dfcf92ca643de6133d32
SHA256
a6d6959d8a30bdccfadd754ae641d991e4919334572aa1725a15af56a91e12a3
SHA512
81d0893509c41e3d2d26134116eaf08b141d296b1bc858f46171ca66639c5858a31997b56a6feac0e6aef54b0a1d0271fdb66dcdc1af3db956b3f2632499e65a
SSDEEP
1536:zk5Diuha4O4dp+qYA8dK2x/zuxVy/TGvaKk7f8CfdUJ2:A5Diwa4B/8djx/zuW+yxI2
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
229981d5759f7facba8ae3d31b29937f_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
?ADME@@YAHK@Z
?ENg1@@YAHK@Z
?RunFather@@YAHK@Z
?RunMe@@YAHK@Z
KillOld
SetHook
runform
testform
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ