__GetExceptDLLinfo
___CPPdebugHook
Behavioral task
behavioral1
Sample
a812f8e2e9e4e19c2cfd6579a5685ad4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a812f8e2e9e4e19c2cfd6579a5685ad4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a812f8e2e9e4e19c2cfd6579a5685ad4_JaffaCakes118
Size
283KB
MD5
a812f8e2e9e4e19c2cfd6579a5685ad4
SHA1
df6332a4b88655c2fefb95fa611acbd68c76e764
SHA256
ffc3a4d4d21f57b4b5dca06d017b6b6c027411dd87b6348daf1837663f9c774e
SHA512
85627807b7f8da33ae79c9e29d2bb71cefa1d533eb284832c95dacebc13897c8c4bd58b757288ec3a2ba5023c0b07779b0b3ab21527ad468611beeb97a45f01e
SSDEEP
6144:V+n1DyNEvLL9gPVJDlQzh9Wg131TmtgMcbWNh96:E1uWTL9gPVJD+9WQ3wKM9H9
resource | yara_rule |
---|---|
sample | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
a812f8e2e9e4e19c2cfd6579a5685ad4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE