PlgDestroy
PlgGetDirectLink
PlgInit
Behavioral task
behavioral1
Sample
2715d5049e8b520da555100a23223ddf_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2715d5049e8b520da555100a23223ddf_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
2715d5049e8b520da555100a23223ddf_JaffaCakes118
Size
30KB
MD5
2715d5049e8b520da555100a23223ddf
SHA1
a52bfd568b6730c32c198ff8f8991657dc9546f2
SHA256
421c42b45db2eb0195675ff3fbc36ecde139bab3ea1cbeeb4a3f247329733704
SHA512
03fa9f7f77e095904e37494f20dbdb36c26242a4c9fd5cfb95d937a2e77c6d5e58153509c0013551ef8f7fb8e4afbd53f8f8c517f80c280e6ba9c26dcbbcd7c1
SSDEEP
768:nhodtyGyVASvFsSgxB8qzsY25pzdnH/N8m5YA+Y:q3yV1vfETn25//J52
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
2715d5049e8b520da555100a23223ddf_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
PlgDestroy
PlgGetDirectLink
PlgInit
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ