@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
Behavioral task
behavioral1
Sample
CDHACK 4.33.4 v.B FIX(новейший!)/cdhack.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CDHACK 4.33.4 v.B FIX(новейший!)/cdhack.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
CDHACK 4.33.4 v.B FIX(новейший!)/cdhack.exe
Resource
win7-20240903-en
Target
fa7fbf079cf18ea32147ac0713b1d7e9_JaffaCakes118
Size
96KB
MD5
fa7fbf079cf18ea32147ac0713b1d7e9
SHA1
5ead6556f004956db6aa831f2eafa8b06fb18fa9
SHA256
23a5df2d52b3350d3c45c398ddae9c8a00a35994fa0824d13a7b0d4aabb35daa
SHA512
2bd854f81ae921d1082b7b765d97b1cd761414e20f326da8b7168c3b47df8e76086968ca53e76b2c6ceb4bda9f8a3cbb832d60b80d61490b7e5883b9cbf671ec
SSDEEP
1536:G0axrdAZOt/I4iKh/rV3zRghQc5vDFfHNlO0JenlmP/SkMVsiMR6+DNqCZ29dar3:G0GjvVVCv9jL/SdJc6+Z5Udarg+Jt
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/CDHACK 4.33.4 v.B FIX(новейший!)/cdhack.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/CDHACK 4.33.4 v.B FIX(новейший!)/cdhack.dll | upx |
static1/unpack001/CDHACK 4.33.4 v.B FIX(новейший!)/cdhack.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/CDHACK 4.33.4 v.B FIX(новейший!)/cdhack.dll |
unpack002/out.upx |
unpack001/CDHACK 4.33.4 v.B FIX(новейший!)/cdhack.exe |
unpack003/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ