installHook
uninstallHook
Behavioral task
behavioral1
Sample
2a6ca998300dabba625cc0f670ef4964_JaffaCakes118.dll
Resource
win7-20240903-en
Target
2a6ca998300dabba625cc0f670ef4964_JaffaCakes118
Size
13KB
MD5
2a6ca998300dabba625cc0f670ef4964
SHA1
b427f8bd729652563ba8a4b49743f7c7fce50ba8
SHA256
e32d80665fdc8c6af5f33207e42e358883cf491c5f715068e4568be07731dda3
SHA512
02915b29767c5d8471df04d9e7255a93fa536aec0816d41b87bcef57a10ca544b63e554757b84cee1811290a36270638042618b129e9d0337971f2a4365e2258
SSDEEP
192:HT+LyPFQn3gIMqaR/0qyWpW8t7vZfe2KOoiT9goUZCTqZEWeaM8r5RKn:yMOtM/M9WpWWRf17oQ9goUZCTsE6RS
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
2a6ca998300dabba625cc0f670ef4964_JaffaCakes118 |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
installHook
uninstallHook
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ