StartHook
pt_ksHook
pt_tzHook
Behavioral task
behavioral1
Sample
2df7e64b9d48e484f52b41fac77f4c2c_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2df7e64b9d48e484f52b41fac77f4c2c_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2df7e64b9d48e484f52b41fac77f4c2c_JaffaCakes118
Size
23KB
MD5
2df7e64b9d48e484f52b41fac77f4c2c
SHA1
6d60c0ff891e0e96825538fa141f087d91890346
SHA256
47a61aa0c98a5894d24486c46d9fda5edcc9a48ab0ed7d80846cec3264a34e51
SHA512
898d656910a1ecdd5b734da67bf4ea041727a9824153cb351f63a89584288ea37b024521030ee2b7f6d05a114d3351c9b37215384a0f16dcf1ac2201d288ed57
SSDEEP
384:Ab+PjqyqAwzx4DY4X7xrBCZ3viovALx2zyxPyp0fYbN7qw6t1IhjdCLnqPYbjm:KifqAwF+Y4XNrC3l00ISEw6t1IOLqg
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
2df7e64b9d48e484f52b41fac77f4c2c_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
StartHook
pt_ksHook
pt_tzHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ