JumpHookOff
JumpHookOn
Behavioral task
behavioral1
Sample
65b85a235a1a09e4b385e1785c883dd9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
65b85a235a1a09e4b385e1785c883dd9_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
65b85a235a1a09e4b385e1785c883dd9_JaffaCakes118
Size
27KB
MD5
65b85a235a1a09e4b385e1785c883dd9
SHA1
491c745405a64fa9c81c6a9235793540c5276d7e
SHA256
5520e81bd899322d11f2797a63affe4524d00ca6aa798945c6fc31c72c9ba90a
SHA512
1770d1262324e6364d273663303b98c8e2528859e55d1298a0907e68d8806998ee9c98ede42258711fd04ad14757f760b926b9855b33f6be0926a1b6176590c4
SSDEEP
384:Ss288bfVvn2KIGF3qgb+yfafbCZ0wEXwa/NAp1c1AW9d5d/B2cWpJ:m8CVNzfaG7EXj/U1w7p2cm
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
65b85a235a1a09e4b385e1785c883dd9_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ