StartHook
StopHook
pt_ksHook
pt_tzHook
Behavioral task
behavioral1
Sample
2c53e72a88b928f164f4b1e09c706b1e_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c53e72a88b928f164f4b1e09c706b1e_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2c53e72a88b928f164f4b1e09c706b1e_JaffaCakes118
Size
12KB
MD5
2c53e72a88b928f164f4b1e09c706b1e
SHA1
4db02cb96017dd23bd282fd555d78dc36153f6f8
SHA256
1f8bd0acea23dc1b5621e1c4fc49c6ab7f26969aef6ddb64694ec0da0ae609cb
SHA512
529d3cbd6213f918a20cbfefde860ea3cfcf0aa16313de194ed43030eafb0a0a2a7efed5b7c6b7819dbbf571c109e77b7c2b46ad41b32f3b1467196130fa14d7
SSDEEP
192:nrhJHMXc0L8cydMfjA8wuyahfZtjw7b4cPQ0+NTBCXsaqc64Pue+IQP/j:DHqcVkjA8wVv4ckBvaqcrPhRQ
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
2c53e72a88b928f164f4b1e09c706b1e_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
StartHook
StopHook
pt_ksHook
pt_tzHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ