__GetExceptDLLinfo
___CPPdebugHook
Behavioral task
behavioral1
Sample
8a0e063a572224d8522823cd0eb257d2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8a0e063a572224d8522823cd0eb257d2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
8a0e063a572224d8522823cd0eb257d2_JaffaCakes118
Size
300KB
MD5
8a0e063a572224d8522823cd0eb257d2
SHA1
31fb03cd4ba355ebe371b15d64615953243b14e4
SHA256
d5246c4e43360d57bf79dc8f426a845f61f41bd12efb7ed4fe3a79a5418461d2
SHA512
3a0f00ab385d72aae7f5592eed73025d734a4d6a11cdca64d55462e302309107497a28fa76a5076ba899a0446b5349393e81f885c81a69e4ee9e22b1411de71d
SSDEEP
6144:NcG/m6nmWu+IoRZVNurOG/G1LmMoI7xwvP6bQ7yMP+DE827AkO:NcG/Rtu+IoRZGOG+1O76b7MP+Dd28kO
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
8a0e063a572224d8522823cd0eb257d2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE