HaHaInstall
HaHaUninstall
Install
ServiceMain
Behavioral task
behavioral1
Sample
00e1de14e3951f129fe95123aec2a49f_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
00e1de14e3951f129fe95123aec2a49f_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
00e1de14e3951f129fe95123aec2a49f_JaffaCakes118
Size
88KB
MD5
00e1de14e3951f129fe95123aec2a49f
SHA1
6a4792cc659cd52e39030c9e5dd5b522d70d8689
SHA256
f47d54baa5bb7ed3e39241a4a01d1b943acca66857ea82e9cf2670577750738b
SHA512
5ac354a97addcd5664e8ab558453f5d416e22abd5fb53974e3b06297a0b4c68f9d51cc4b34cd66c6f613409397e3c1c24e4f384e08ca8f80715315164a1df6b6
SSDEEP
1536:HgyJEfqEycxz4s3enHcyFnToIfOgTqtr5ZB++++++++++d/IaNTelbN6RPEwUlMv:/rEenHXtTBf/Tqtr5ZPNTelbN6RPvUlY
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
00e1de14e3951f129fe95123aec2a49f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
lstrcpynA
WinExec
MoveFileExA
GetTickCount
SetThreadPriority
GetCurrentThread
GetFileSize
CreateFileA
WriteFile
CreateThread
GlobalMemoryStatusEx
GetVersionExA
GetComputerNameA
InterlockedExchange
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
WaitForSingleObject
lstrcpyA
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Module32First
OpenProcess
GetPriorityClass
Process32Next
lstrlenA
SetLastError
GetCurrentProcess
MoveFileA
CopyFileA
DeleteFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
LoadLibraryA
Sleep
GetProcAddress
GetDriveTypeA
FreeLibrary
CreatePipe
CloseHandle
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
ReadFile
FreeConsole
keybd_event
ExitWindowsEx
mouse_event
CreateWindowExA
CloseWindow
SendMessageA
IsWindow
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
SetCursorPos
GetDesktopWindow
wsprintfA
CreateCompatibleBitmap
BitBlt
CreateDCA
DeleteDC
CreateCompatibleDC
SelectObject
DeleteObject
GetDIBits
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerA
DeleteService
CreateServiceA
RegOpenKeyA
RegCreateKeyA
RegOpenKeyExA
RegSetValueExA
QueryServiceStatus
CloseServiceHandle
StartServiceA
ChangeServiceConfigA
OpenServiceA
OpenSCManagerA
ControlService
RegCloseKey
ShellExecuteA
SHGetFileInfoA
wcstombs
_adjust_fdiv
_initterm
free
_onexit
__dllonexit
??1type_info@@UAE@XZ
malloc
srand
rand
_ui64toa
_strlwr
_ftol
strstr
strcspn
atoi
??3@YAXPAX@Z
_except_handler3
_CxxThrowException
strncat
strncpy
sprintf
??2@YAPAXI@Z
__CxxFrameHandler
capCreateCaptureWindowA
capGetDriverDescriptionA
setsockopt
send
recv
gethostbyname
inet_addr
WSAStartup
shutdown
closesocket
connect
socket
htons
sendto
htonl
WSASocketA
WSAIoctl
HaHaInstall
HaHaUninstall
Install
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ