a234
a99
ua234
Behavioral task
behavioral1
Sample
2ed5693af560ad28a1db8f2ab28fd134_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ed5693af560ad28a1db8f2ab28fd134_JaffaCakes118.dll
Resource
win10v2004-20240708-en
Target
2ed5693af560ad28a1db8f2ab28fd134_JaffaCakes118
Size
163KB
MD5
2ed5693af560ad28a1db8f2ab28fd134
SHA1
cb3fc9e4c1fa9413c60357d67119b6d0b05d9706
SHA256
970c76f06eadf5f1d23561e0d3d4cb643d535e1c5588e387f57a4144a585e31b
SHA512
6354cecbcfc8ad983d0b026c852999fc72c3f0c9bbbd0af864a8563a828dd4b97b3737ee8dc6a68a4e8c8859bdf56aeb83952a0f17331f9ca948dd7efd524752
SSDEEP
3072:JHqi4jFi4dk8RQISHj2heVwtCxPnl/9JqYOCOrEfl8QJhs3ZnF86tbjA3:JKi4jNW8bSDXVDxflHqYwIfli3ZJjA
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
2ed5693af560ad28a1db8f2ab28fd134_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord5213
time
VirtualQueryEx
GetModuleHandleA
LoadLibraryA
VirtualAlloc
GetModuleFileNameA
ExitProcess
UnhookWindowsHookEx
MessageBoxA
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
a234
a99
ua234
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ