a234
a99
ua234
Behavioral task
behavioral1
Sample
a52a0c9fb1e9f4f95815a1ee2ab7aff2_JaffaCakes118.dll
Resource
win7-20240705-en
Target
a52a0c9fb1e9f4f95815a1ee2ab7aff2_JaffaCakes118
Size
175KB
MD5
a52a0c9fb1e9f4f95815a1ee2ab7aff2
SHA1
b7ecb0bafb61d0224795dd8fa9ee23bd45cf8c1c
SHA256
9fbceca23553f41a6f21fa7d0c58b78e0c992d1e6c1f45e5b77269fd770a486f
SHA512
2de7ad7a7e105b0fdf926779f0bb7e6a7cf5d374960a41cf92518747ff48d7a47797d9dbddeaeaddef7b7936e6cfe73484ab9354b41a4b3e91c3ad2ac17e0fcb
SSDEEP
3072:JeeChkt6SWeKqtw30oRhEVvJDTenV4g/t2uDSNuoRRL/y9UfzUWY5DxM:JzCit4elcihJnenDQwSN7yiODx
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
a52a0c9fb1e9f4f95815a1ee2ab7aff2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord265
__CppXcptFilter
CreateRemoteThread
GetModuleHandleA
LoadLibraryA
VirtualAlloc
GetModuleFileNameA
ExitProcess
SetWindowsHookExA
MessageBoxA
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
a234
a99
ua234
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ