@RWinSocket@DispatchProc$qqsp6HWND__uiuil
__GetExceptDLLinfo
___CPPdebugHook
Behavioral task
behavioral1
Sample
c7ec8e5bb31c29b6c038c951b4aab1dc_JaffaCakes118.exe
Resource
win7-20240704-en
Target
c7ec8e5bb31c29b6c038c951b4aab1dc_JaffaCakes118
Size
1.1MB
MD5
c7ec8e5bb31c29b6c038c951b4aab1dc
SHA1
a815a9f0477c43808b52001209bc51684b5f756b
SHA256
88635da8c7aa244a2360273389fc04b47ee709c86acc90f23ae0036e8dc03a9a
SHA512
40227591b588f47efecb6628e9f575fe4777f9fd19ba59dccb669754f27f13a77a5c290744c58db7e54ec475904cc7b54d53d3b80fa288fb7975d504f3e79631
SSDEEP
24576:RLAfIFsSHvvPEI7ixGD+vtWMoEuS6i/kfzC/ZnnoSan+Gv4wmsFi3E958ontk3aN:eU1vPEI7iID+vt7tp/ln1o+3wmyME96m
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
c7ec8e5bb31c29b6c038c951b4aab1dc_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
@RWinSocket@DispatchProc$qqsp6HWND__uiuil
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ