DllEntryPoint
GetUnzDllPrivVersion
GetUnzDllVersion
UnzDllExec
___CPPdebugHook
Behavioral task
behavioral1
Sample
d2d0ee35dd07835b25af06034648c6df_JaffaCakes118.dll
Resource
win7-20240903-en
Target
d2d0ee35dd07835b25af06034648c6df_JaffaCakes118
Size
56KB
MD5
d2d0ee35dd07835b25af06034648c6df
SHA1
6621b67c8fbdcc1f033281399f6b25b020c18e37
SHA256
c2e9b955013876eb37b834cec45ae77dcbe8f166042a09adafdc86ae7afc55c3
SHA512
dcafede2abf69df17e97d5c3bf49fe0faec6f16e4dacbc01a482d3ac0762bb427e390062b4aadf50dc2e81bf9a44b00a0b73b104f218d8162f7ad3c5d1d562b4
SSDEEP
768:7NCg2vgEFXdJJlJRY8cSJe6BwJEMY91Is01m94tEcmD0/9mQS+tXYdz:bBEFXLdRY84eTCx1y4tv9SKXK
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
d2d0ee35dd07835b25af06034648c6df_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
DllEntryPoint
GetUnzDllPrivVersion
GetUnzDllVersion
UnzDllExec
___CPPdebugHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ