?ExtractServices@@YAHPAD@Z
?InitSQLConnectOff@@YAHPAD@Z
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
Behavioral task
behavioral1
Sample
31abc95687a7c10ad9dab3f2c5281024_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
31abc95687a7c10ad9dab3f2c5281024_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
31abc95687a7c10ad9dab3f2c5281024_JaffaCakes118
Size
40KB
MD5
31abc95687a7c10ad9dab3f2c5281024
SHA1
79c31634abd85b132767efc5b3cf8dfba218547b
SHA256
f0336332b44281fa62162396f950cb8b8fa7082217dceef808673fd63586b954
SHA512
cfce88ef697f5f37e32f93d3ea5a3d1f6009ba82edbb5fee90b52b42063c458c4e25004829c0761fa561b8f2856684764c1da2060ebeda6f4588a9a5dfeb5cec
SSDEEP
768:jzfMCyLvhTytOjzEXOKp4RIaGE9ZlTvQb10FQzOdR4E2IdxD:j3yMtOvPI6IaGEvlC109WEdD
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
31abc95687a7c10ad9dab3f2c5281024_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
?ExtractServices@@YAHPAD@Z
?InitSQLConnectOff@@YAHPAD@Z
InitSQLConnect
SQLAlloc
SQLClose
SQLExecute
SQLFree
SQLQuery
Uninstall
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ