@@Main@Finalize
@@Main@Initialize
__GetExceptDLLinfo
___CPPdebugHook
_oshcod4
Behavioral task
behavioral1
Sample
759_OldSchoolHackRC/OldSchoolHack RC4/SchoolHackCoD4MultiRC3.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
759_OldSchoolHackRC/OldSchoolHack RC4/SchoolHackCoD4MultiRC3.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
759_OldSchoolHackRC/OldSchoolHack RC4/SchoolHackCoD4MultiRC4.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
759_OldSchoolHackRC/OldSchoolHack RC4/SchoolHackCoD4MultiRC4.exe
Resource
win10v2004-20240709-en
Target
3e1c77c99204dda543802c2e1307fccf_JaffaCakes118
Size
436KB
MD5
3e1c77c99204dda543802c2e1307fccf
SHA1
06fe615b9669cd5170c56f250917e962a14fd63a
SHA256
b5ac7ea7f2e92142b7b294e05579a284d35df5014d8344b17636fafc08ca3f62
SHA512
75be88fc5c38f94ec013b30e5737625a7f927e71d6105b03210e8bfd2a1b348e8ba1f7f158b7bc8a1a06e90377ed09d0eb48841436c44d5caa63c199449521df
SSDEEP
12288:SiQsCebEBbbaoeXDNaY1KCR7cC4FvWYkDQd2tgBOrQK+16o:DbEB3zeXhV1zR7J4Fv+DA2tgWQBso
resource | yara_rule |
---|---|
static1/unpack001/759_OldSchoolHackRC/OldSchoolHack RC4/SchoolHackCoD4MultiRC3.exe | aspack_v212_v242 |
static1/unpack001/759_OldSchoolHackRC/OldSchoolHack RC4/SchoolHackCoD4MultiRC4.exe | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
unpack001/759_OldSchoolHackRC/OldSchoolHack RC4/SchoolHackCoD4MultiRC3.exe |
unpack001/759_OldSchoolHackRC/OldSchoolHack RC4/SchoolHackCoD4MultiRC4.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
@@Main@Finalize
@@Main@Initialize
__GetExceptDLLinfo
___CPPdebugHook
_oshcod4
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
@@Main@Finalize
@@Main@Initialize
__GetExceptDLLinfo
___CPPdebugHook
_oshcod4
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE