DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Behavioral task
behavioral1
Sample
f705f66dd1734fef5c3f2a41c7c7254a_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f705f66dd1734fef5c3f2a41c7c7254a_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
f705f66dd1734fef5c3f2a41c7c7254a_JaffaCakes118
Size
70KB
MD5
f705f66dd1734fef5c3f2a41c7c7254a
SHA1
bd03e4008be05c0a0a6edd06ed534fb5144b7f7e
SHA256
af7495ef2a261b0cfdbf30c27344e537728381b4bdf2e8d8ff741fea78c6563d
SHA512
ba5b63ab7f56040a78b3c22c6df10c96a43e82ae330ba5e7590675fa58a9b0df8c6782ffb32355226b01e596f60449f9ea512e5bdb0704f7ca540154f5101061
SSDEEP
1536:JFCWgv5KyLbq8/OUfmGU/MrwU+tpgRh6Tj2KQ7Y:J0JhKuPeGUa+tpcoj2FM
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
f705f66dd1734fef5c3f2a41c7c7254a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
VirtualFree
VirtualAlloc
ExitProcess
GetProcAddress
LoadLibraryExA
GetModuleHandleA
VirtualProtect
GetModuleFileNameA
FreeLibrary
GetLastError
CreateMutexA
LoadLibraryA
DeleteCriticalSection
VirtualProtect
wsprintfA
MessageBoxA
GetKeyboardType
RegQueryValueExA
SysFreeString
GetPixel
WSACleanup
InternetReadFile
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ