___CPPdebugHook
_decrypt
_encrypt
Behavioral task
behavioral1
Sample
PES2012_BaL_Money/BaLSettings.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
PES2012_BaL_Money/BaLSettings.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
PES2012_BaL_Money/decrypt.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
PES2012_BaL_Money/decrypt.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
᪠砭 ᠩ PlayGround.ru.url
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
᪠砭 ᠩ PlayGround.ru.url
Resource
win10v2004-20240802-en
Target
9fca597e6a74f20e60362c17ba0bd711_JaffaCakes118
Size
138KB
MD5
9fca597e6a74f20e60362c17ba0bd711
SHA1
4716cd9aba20d1439552f2c0682f1c417a0fcfa3
SHA256
c2ed0718c538ee961eba9a459990bf8e931c4ea49d4933e83dbe583d0cff5690
SHA512
445718d2e29259ff31bb26b4ed522f7b649110f1f9e9356f9b1e37661249d5da0dfc86c66ad40eb9d1d6178e69dd773f859fda001caa158b8b50ed3a0b628f04
SSDEEP
3072:8Kn1xQAQBtVgGNunMFkU9JrH3g6W8wkcFhQ0/BhQpZClJ/aReMYjuMkWKtc:qAQBrgsW1OJrw6g1l/8pZ0EReD6VWK2
resource | yara_rule |
---|---|
static1/unpack002/PES2012_BaL_Money/BaLSettings.exe | family_neshta |
Checks for missing Authenticode signature.
resource |
---|
unpack002/PES2012_BaL_Money/BaLSettings.exe |
unpack002/PES2012_BaL_Money/decrypt.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
CreateFileA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WriteFile
EnumThreadWindows
MessageBoxA
wsprintfA
___CPPdebugHook
_decrypt
_encrypt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ