@@Main@Finalize
@@Main@Initialize
__GetExceptDLLinfo
___CPPdebugHook
_hackform
Behavioral task
behavioral1
Sample
404e8d7d86f6c0d3ecf6dfdb96d1a028_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
404e8d7d86f6c0d3ecf6dfdb96d1a028_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
404e8d7d86f6c0d3ecf6dfdb96d1a028_JaffaCakes118
Size
276KB
MD5
404e8d7d86f6c0d3ecf6dfdb96d1a028
SHA1
7865ae33ae6288040808fe50a6737e2c78219203
SHA256
da2a7e1cd8e9be86ed198cbed0633d8e3e79fcc286be699406c77c7d17592723
SHA512
44a491bb028ef10e1a585b4a8e07ecd4dbd49c735e53ba265c8a8d6e263c98684a59c21b5c7b1f94b8631ec7b92128c7a2ab4898c931d7d8ffe031ae589d7cc4
SSDEEP
6144:fUqCiCoeIoyWesJAVAx7UEi8H9oAnmmGmk1QfzKhoI:fUqCi7U2I7/LH6AnpT
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
404e8d7d86f6c0d3ecf6dfdb96d1a028_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
@@Main@Finalize
@@Main@Initialize
__GetExceptDLLinfo
___CPPdebugHook
_hackform
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ