@@Unit_frmmain@Finalize
@@Unit_frmmain@Initialize
@Awardbiospas@Finalization$qqrv
@Awardbiospas@My_GetBiosPassword$qqrv
@Awardbiospas@initialization$qqrv
_FrmMain
__GetExceptDLLinfo
___CPPdebugHook
Behavioral task
behavioral1
Sample
10064312749/Demo1/Demo1.js
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
10064312749/Demo1/Demo1.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
10064312749/exe/Demo1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
10064312749/exe/Demo1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
10064312749/exe/Demo2.exe
Resource
win7-20240729-en
Target
df66f970149e0ec9fa948586d38f6ec5_JaffaCakes118
Size
175KB
MD5
df66f970149e0ec9fa948586d38f6ec5
SHA1
f02a5a36091e13b11c20a885259abd52b788af4b
SHA256
900933197d3892d724340c222934b71d853fe23af537073a30d8e4ab15daa92b
SHA512
4b20d68e9f6eae6da576c99d9f7b27209f80339faca37f6b1653f035d71f0274dfeba281ac617a443868e9c054f3df9cb59aae0e2a4b7eb4614950d698089229
SSDEEP
3072:qE0QdmQgsHk9WBV+bXw71lYTgHWd7vgghvvHwKsIpLu0AQ483BYGN/g1kkHRkt:qE0QpgsHZsA76sG3vX+K+u/g1kU6
resource | yara_rule |
---|---|
static1/unpack001/10064312749/exe/Demo1.exe | upx |
static1/unpack001/10064312749/exe/Demo2.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/10064312749/exe/Demo1.exe |
unpack002/out.upx |
unpack001/10064312749/exe/Demo2.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
@@Unit_frmmain@Finalize
@@Unit_frmmain@Initialize
@Awardbiospas@Finalization$qqrv
@Awardbiospas@My_GetBiosPassword$qqrv
@Awardbiospas@initialization$qqrv
_FrmMain
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE