EurekaLog_PasswordRequestEvent
ExceptionManager
Behavioral task
behavioral1
Sample
6122de4052315f7a017119c2f6cfea57_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6122de4052315f7a017119c2f6cfea57_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
6122de4052315f7a017119c2f6cfea57_JaffaCakes118
Size
942KB
MD5
6122de4052315f7a017119c2f6cfea57
SHA1
190881af38ef463d7243674084021d9daf531381
SHA256
2e3ea4d9765ff046a07b326e5db52a920b015778c7150147ff16aaa4ef98996a
SHA512
c34890bc8d481ee609b8edaa907ee2e34e20245e074044b49fb0239eab10ed5b2e07d57e43f46a57609cdfaec9a5b3c82c8d5c171435fe9d650513d29f890a11
SSDEEP
24576:XRIk4rBUg+QCgAMGdl3WQ8aby9K3dVTO0Hp:XORBwQFAFPUaeK3C0J
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
6122de4052315f7a017119c2f6cfea57_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
EurekaLog_PasswordRequestEvent
ExceptionManager
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ