InstallHook
MainMonitor
Start
init
init_FXRun
init_FXSetup
init_PPRun
init_PPSetup
init_ZMRun
Behavioral task
behavioral1
Sample
f41336acae3f2f8415bb72b80fd8ccba_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f41336acae3f2f8415bb72b80fd8ccba_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
f41336acae3f2f8415bb72b80fd8ccba_JaffaCakes118
Size
64KB
MD5
f41336acae3f2f8415bb72b80fd8ccba
SHA1
92bcda2f5597dcef6d71c813a530db270a3ac466
SHA256
3699ce956ce378b4f5e5e618dec6a14e701f0bc9c5b56d06a9ee2130293ed05b
SHA512
717dd0c87f85d7a6055b94ce5da5608003b2079c446ee6db9e82d5a9f6e4737e4cd9f6bd55ac987e4c08c248c016c5a21315ce8fa5444cfc8e42f6afd4d23aee
SSDEEP
1536:5STKjsAltWAZteP/nq0FogvIJ3X/vYpzRX:5sKIAltvWPVogv0HYp9X
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
f41336acae3f2f8415bb72b80fd8ccba_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteProcessMemory
VirtualProtectEx
CreateProcessW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcess
CreateRemoteThread
GetModuleHandleW
VirtualAllocEx
WritePrivateProfileStringW
MoveFileW
GetPrivateProfileIntW
GetPrivateProfileStringW
DeleteFileW
FindClose
SetFileAttributesW
FindFirstFileW
GetFileSize
ResumeThread
MultiByteToWideChar
GetExitCodeThread
CreateThread
ReadFile
GetCommandLineW
LoadLibraryW
FlushFileBuffers
GetStringTypeW
GetStringTypeA
RtlUnwind
SetStdHandle
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
CloseHandle
GetProcAddress
GetCurrentProcessId
Sleep
OpenProcess
TerminateProcess
GetSystemDirectoryW
CreateFileW
SetFilePointer
WideCharToMultiByte
WriteFile
GetStartupInfoA
GetFileType
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetModuleHandleA
SetHandleCount
GetStdHandle
VirtualProtect
EnumWindows
GetSystemMetrics
SetThreadDesktop
OpenDesktopW
SetProcessWindowStation
OpenWindowStationW
ShowWindow
GetWindowLongW
GetDlgItem
PostMessageW
SendMessageW
SetForegroundWindow
DestroyWindow
GetWindowThreadProcessId
EnumChildWindows
SetCapture
WaitForInputIdle
GetClassNameW
MoveWindow
GetParent
GetWindowTextW
FindWindowW
gethostname
gethostbyname
WSAStartup
URLDownloadToFileW
Netbios
waveOutGetVolume
waveOutSetVolume
ImpersonateLoggedOnUser
RegDeleteKeyW
RegEnumValueW
RegCreateKeyW
RegOpenKeyExW
RegSetValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
CreateProcessAsUserW
OpenProcessToken
DuplicateTokenEx
SHGetSpecialFolderPathW
InstallHook
MainMonitor
Start
init
init_FXRun
init_FXSetup
init_PPRun
init_PPSetup
init_ZMRun
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ