GetPluginInfo
PluginFunc
___CPPdebugHook
Behavioral task
behavioral1
Sample
34e0fa4d045b6665d40b45a527a940e6_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
34e0fa4d045b6665d40b45a527a940e6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
34e0fa4d045b6665d40b45a527a940e6_JaffaCakes118
Size
70KB
MD5
34e0fa4d045b6665d40b45a527a940e6
SHA1
0c7c9c9b9e38d6f070b982c266b5b4c371ef6375
SHA256
c0cc2f70d6ed50fc8b497be9b94a461a9ce9d326a9fd600cbfa0c03a58f096c3
SHA512
3fe00d61c6c964e8e54da652fe4eb80f3062ab54d8204af8e663db8834acc9401111e021d310f9ddb237f66161824a0ba62b7a19ccbd0918744043b62f22d2d8
SSDEEP
1536:WfOrXac/ry0uYehb8znH07N5NodybMerrSYr5SAjgvggVB:WfOrXac/fabSH0LNoYP9VSA4ggVB
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
34e0fa4d045b6665d40b45a527a940e6_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
GetPluginInfo
PluginFunc
___CPPdebugHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ