??������?��?��?_??��yD��
init
Behavioral task
behavioral1
Sample
47ce7eec3f486806399480a55de9879b_JaffaCakes118.dll
Resource
win7-20240508-en
Target
47ce7eec3f486806399480a55de9879b_JaffaCakes118
Size
3.1MB
MD5
47ce7eec3f486806399480a55de9879b
SHA1
1ca156276e304354fd26cec0e0db217726a70e01
SHA256
f938e4114b509d11273e3395985bdea9cdc7089bcf023393240d5c95060d0af0
SHA512
8dda0797435bfba2c23dcb6c0e2c7d5062030361ddbaace4e0d7432b516fd51c79e188434a5ee9aefb237ce6aa4b0acc10bd70af73e625bd76237a4484530ea0
SSDEEP
49152:G3UFwK2ZKC51He77wh3JG7WrCHpdKDNV1OsXj8Za28SWH:U2+dncmDBzXAZ8SY
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
47ce7eec3f486806399480a55de9879b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LCMapStringA
GetCommandLineA
GetCurrentDirectoryA
GetDiskFreeSpaceA
MulDiv
GetUserDefaultLCID
SetEndOfFile
SetFilePointer
GetLocalTime
RemoveDirectoryA
GetStartupInfoA
SetFileAttributesA
WriteFile
FindClose
FindFirstFileA
FindNextFileA
GetFileSize
Sleep
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
ExitProcess
GetTempPathA
IsWow64Process
GetVersionExA
SetWaitableTimer
CreateWaitableTimerA
InterlockedExchange
InterlockedExchangeAdd
GlobalFree
GlobalSize
GlobalUnlock
GlobalLock
GlobalAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
ExpandEnvironmentStringsA
DeleteFileA
DeviceIoControl
GetCurrentThread
WriteProcessMemory
lstrlenW
GetComputerNameA
RemoveVectoredExceptionHandler
SetProcessWorkingSetSize
Module32Next
SetThreadPriority
SetThreadContext
ResumeThread
AddVectoredExceptionHandler
VirtualQueryEx
VirtualFreeEx
DuplicateHandle
GetQueuedCompletionStatus
SetEvent
CreateThread
CreateIoCompletionPort
QueryDepthSList
InitializeSListHead
HeapCreate
VirtualFree
HeapDestroy
PostQueuedCompletionStatus
InterlockedCompareExchange
WaitForSingleObject
LocalSize
LocalFree
LocalAlloc
GetSystemInfo
TerminateProcess
lstrcpynA
CreateEventA
OpenEventA
ExitThread
Module32First
Thread32Next
SuspendThread
Thread32First
GetDriveTypeA
CreateFileA
MoveFileExA
InterlockedPushEntrySList
GetLastError
InterlockedDecrement
InterlockedIncrement
RtlZeroMemory
InterlockedPopEntrySList
VirtualQuery
HeapAlloc
GetProcessHeap
GetTickCount
GlobalMemoryStatusEx
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
lstrcpyn
QueryDosDeviceA
GetLogicalDriveStringsA
FreeLibrary
VirtualProtect
GetProcAddress
LoadLibraryA
TerminateThread
OpenThread
WaitForSingleObjectEx
GetExitCodeProcess
ReadFile
PeekNamedPipe
CloseHandle
CreateProcessA
CreatePipe
DebugActiveProcessStop
ContinueDebugEvent
WaitForDebugEvent
DebugActiveProcess
ReadProcessMemory
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
GetSystemDirectoryA
GetTempFileNameA
VirtualAllocEx
CopyFileA
CreateRemoteThread
GetModuleHandleA
GetCurrentProcess
GetCurrentProcessId
OutputDebugStringA
SetEnvironmentVariableA
CompareStringW
CompareStringA
RtlMoveMemory
VirtualAlloc
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStdHandle
SetHandleCount
GetFileType
SetStdHandle
HeapSize
GetACP
GetSystemTime
RaiseException
RtlUnwind
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
WritePrivateProfileStringA
GlobalFlags
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
GetStringTypeExA
FlushFileBuffers
DeleteCriticalSection
lstrlenA
GetWindowsDirectoryA
GetTimeZoneInformation
SetLastError
lstrcpyA
lstrcatA
LockResource
LoadResource
FindResourceA
GetVersion
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetWindowLongA
PtInRect
PostQuitMessage
PostMessageA
SetCursor
GetLastActivePopup
ValidateRect
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
CreateDialogIndirectParamA
EndDialog
UnregisterClassA
GetMenuItemCount
SendDlgItemMessageA
IsDialogMessageA
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetWindowLongA
GetDlgItem
UpdateWindow
SystemParametersInfoA
FindWindowA
DispatchMessageA
SetWindowTextA
GetDesktopWindow
GetWindow
GetClassNameA
SendMessageA
SendMessageTimeoutA
GetWindowRect
GetSystemMetrics
SetForegroundWindow
SetActiveWindow
GetActiveWindow
IsWindowEnabled
GetWindowThreadProcessId
ScreenToClient
GetWindowInfo
GetParent
SetWindowsHookExA
CallNextHookEx
MessageBoxA
MessageBoxTimeoutA
ShowWindow
EnumDisplaySettingsA
IsWindow
IsWindowVisible
GetWindowTextA
BlockInput
ClipCursor
GetDC
GetForegroundWindow
EnumChildWindows
RegisterShellHookWindow
GetClientRect
GetWindowTextLengthA
EnumWindows
GetCursorPos
ReleaseDC
EnableWindow
MsgWaitForMultipleObjects
PostThreadMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetDlgCtrlID
AdjustWindowRectEx
WindowFromDC
RegisterWindowMessageA
wsprintfA
CryptGetHashParam
RegOpenKeyExA
RegDeleteValueA
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
CryptHashData
CryptDestroyHash
RegCreateKeyExA
RegEnumValueA
RegEnumKeyA
RegCloseKey
OpenSCManagerA
GetUserNameA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CloseServiceHandle
CreateServiceA
OpenServiceA
StartServiceA
ControlService
DeleteService
QueryServiceStatusEx
GetServiceDisplayNameA
GetServiceKeyNameA
EnumServicesStatusExA
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegDeleteKeyA
OleInitialize
CLSIDFromString
CreateStreamOnHGlobal
GetHGlobalFromStream
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
TextOutA
DeleteDC
DeleteObject
GdiFlush
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
SetViewportExtEx
ScaleViewportExtEx
CreateBitmap
ScaleWindowExtEx
GetClipBox
CreateCompatibleBitmap
StretchBlt
GetCurrentObject
GetObjectA
GetBitmapBits
SetDIBits
GetObjectType
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
GetStockObject
GetPixel
SetWindowExtEx
Escape
ExtTextOutA
RectVisible
PtVisible
WSACleanup
WSAStartup
closesocket
ioctlsocket
bind
gethostbyname
inet_addr
ntohs
gethostname
socket
htons
connect
send
recv
select
listen
accept
__WSAFDIsSet
getpeername
htonl
recvfrom
sendto
getsockname
InternetConnectA
InternetOpenA
InternetSetOptionA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
InternetCanonicalizeUrlA
InternetCrackUrlA
WSARecv
WSCEnumProtocols
WSAIoctl
WSASend
WSASocketA
IcmpCreateFile
PathUnExpandEnvStringsA
PathIsDirectoryA
PathFindFileNameA
PathFileExistsA
DnsFlushResolverCache
GetMappedFileNameA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiClassGuidsFromNameA
NetApiBufferFree
NetServerEnum
GdipCreateBitmapFromStream
GdiplusStartup
GdipSaveImageToStream
GdipDisposeImage
ord42
ord8
SHGetSpecialFolderPathA
RasGetEntryDialParamsA
RasEnumEntriesA
RasHangUpA
RasGetConnectStatusA
DocumentPropertiesA
OpenPrinterA
ClosePrinter
ord17
??������?��?��?_??��yD��
init
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ