__GetExceptDLLinfo
___CPPdebugHook
Behavioral task
behavioral1
Sample
a661136c8b0999ba51e6f9c2b16627be_JaffaCakes118.exe
Resource
win7-20240729-en
Target
a661136c8b0999ba51e6f9c2b16627be_JaffaCakes118
Size
329KB
MD5
a661136c8b0999ba51e6f9c2b16627be
SHA1
d0c3e478a748d97f828f03227ff958c380313635
SHA256
bd792203262c3d2b221e9f49b982b33990ef072bec97cf3c0cadd0f1a52eda5c
SHA512
348845c6eab6eeb259c5c6d5aec813291557a28d23eb06f83536e2e40c3dfbd829039bbb17942dae47e3595cb7598f8f5a968a950d432b1f7e7a78f1c5f90d97
SSDEEP
6144:qSKTfEAhs7Bb6jBlwMk6uartwQHjNu4IP8WfnQZmicXRYAt1cDz++YDt:qHAA6db6jBlwwrlDNu4IEWQZmicXR/+4
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
a661136c8b0999ba51e6f9c2b16627be_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ