HookKB
HookKBLL
HookSHELL
UnHookKB
UnHookKBLL
UnHookSHELL
Behavioral task
behavioral1
Sample
f4e77f6812070276b84de7ba3a70d384_JaffaCakes118.dll
Resource
win7-20240903-en
Target
f4e77f6812070276b84de7ba3a70d384_JaffaCakes118
Size
222KB
MD5
f4e77f6812070276b84de7ba3a70d384
SHA1
dd76fecea950f5b3cafab50057cf285086df1552
SHA256
9912c735e50af21d87b3ca169da558bee8c03f6cb5c849f4421c091d1f60d4a6
SHA512
d5b84dc8a92c40f84caea7a38c7baf4029f3fe8a5280d683407644eb028f38f39c35830cfbd28f4f85130c4d5ae98cd760b6f0d547c63e6bbeb5e820c629ae93
SSDEEP
6144:O362WhWk6mx+PsE5+NM1Rj5CmG8Yr4kPk4bwR+:OUUmxBE5+NMhCmGEYkD4
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
f4e77f6812070276b84de7ba3a70d384_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
HookKB
HookKBLL
HookSHELL
UnHookKB
UnHookKBLL
UnHookSHELL
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ