__GetExceptDLLinfo
___CPPdebugHook
Behavioral task
behavioral1
Sample
a6d947204f8956ef9f4f0977c6d652aa_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6d947204f8956ef9f4f0977c6d652aa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a6d947204f8956ef9f4f0977c6d652aa_JaffaCakes118
Size
139KB
MD5
a6d947204f8956ef9f4f0977c6d652aa
SHA1
224412e87a69a5a3dd6182d322263308bc9ec362
SHA256
d33082255ed301fe7f38fa4b464ace72ace641fd334c94404e23adf2f1358a94
SHA512
ebe3e01a0cddfb4bc8b8142560753c647b4b839a416c72cec666d07415a82f9e3cc791ff81da3c2481d56b5a9f21239c18ee29436cf5dbe228048e7fab5747d3
SSDEEP
3072:Hv7YSDh4EHDWvqz2kXwc9K5K98iocRJ/hi1tfFFLV6V:zYSDhNiFK9K89TCtfFR6
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
a6d947204f8956ef9f4f0977c6d652aa_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE