Sdfghjkli
ServiceMain
Behavioral task
behavioral1
Sample
16f9330289ea11e0cf05b3747ca19ba7_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
16f9330289ea11e0cf05b3747ca19ba7_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
16f9330289ea11e0cf05b3747ca19ba7_JaffaCakes118
Size
98KB
MD5
16f9330289ea11e0cf05b3747ca19ba7
SHA1
c2eca4d69d6a6fe0951c6f5d693ae3062a803cd4
SHA256
5b7f0f19f5d76b8256af323e007fdcad4607ba274da002a5f536edcaaa56c32a
SHA512
ab15123b55041b3e09491e072232d19bacae1e01e6b10b38a6e41a2aba3fb2b09c17a61c0bb5c475b0f94a6671a2ce6480f5a311c654d708a0350a62a1c4b100
SSDEEP
3072:/Hq0ol/CLm89a/CwxCEKJ5oTLGCXeEZqU4dpnQU3mWu:PwlrsaXKPKCUPqLdpU
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
16f9330289ea11e0cf05b3747ca19ba7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegCloseKey
CreateServiceA
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
QueryServiceConfigA
EnumServicesStatusA
ChangeServiceConfigA
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
RegOpenKeyExA
RegQueryValueExA
OpenServiceA
GetUserNameW
LookupPrivilegeValueA
ImpersonateSelf
OpenThreadToken
AdjustTokenPrivileges
OpenSCManagerA
DeleteService
ControlService
CloseServiceHandle
capCreateCaptureWindowA
capGetDriverDescriptionA
DeleteObject
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetDeviceCaps
CreateDCA
CreateCompatibleBitmap
GetDIBits
ImmReleaseContext
ImmGetCompositionStringW
ImmGetCompositionStringA
ImmGetContext
lstrcatW
lstrlenW
OpenProcess
CreateDirectoryA
MoveFileA
GetDriveTypeA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GetFileAttributesExA
FindClose
GetLastError
lstrcmp
FindNextFileA
FindFirstFileA
lstrcmpi
Process32Next
Process32First
CreateToolhelp32Snapshot
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
GetEnvironmentVariableA
GetProcAddress
FreeLibrary
LocalAlloc
FlushFileBuffers
RaiseException
OpenEventA
OpenMutexA
GetFileSize
GlobalAlloc
GlobalLock
lstrcpyW
WaitForMultipleObjects
ResetEvent
ReleaseMutex
GlobalFree
CreateEventA
CreateMutexA
GetFileSizeEx
SetFilePointerEx
ReadFile
GetCurrentProcess
GetPriorityClass
GetThreadPriority
SetPriorityClass
SetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersion
GetVersionExA
TerminateProcess
ResumeThread
GetSystemInfo
GlobalMemoryStatus
GetComputerNameA
GetACP
GetOEMCP
GetLocalTime
GetTempPathA
WriteFile
GetCurrentThread
GetCurrentProcessId
SetFilePointer
WideCharToMultiByte
SearchPathA
InterlockedExchange
LoadLibraryA
GetModuleFileNameA
lstrlen
DeviceIoControl
CreateFileA
CloseHandle
GetSystemDirectoryA
SetEvent
DeleteFileA
lstrcpy
GetCurrentThreadId
GetStartupInfoA
CreateProcessA
Sleep
lstrcat
WaitForSingleObject
GetTickCount
VirtualProtect
GetModuleFileNameA
ExitProcess
malloc
strrchr
__dllonexit
_onexit
_initterm
_adjust_fdiv
wcscmp
free
strchr
_beginthread
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
GetModuleFileNameExA
ShellExecuteA
SHFileOperation
SHEmptyRecycleBinA
StrCmpW
StrChrA
StrStrA
StrRChrA
SHDeleteKeyA
StrCmpNIA
StrToIntA
ExitWindowsEx
CallNextHookEx
OpenInputDesktop
GetThreadDesktop
GetMessageA
SetTimer
SetWindowsHookExA
SendInput
SetCursorPos
PostMessageA
OpenDesktopA
GetForegroundWindow
SetWindowsHookExW
GetWindowTextA
GetWindowThreadProcessId
wsprintfW
GetActiveWindow
CharLowerA
PostThreadMessageA
CharUpperA
EnumWindows
UpdateWindow
BringWindowToTop
ShowWindow
DestroyWindow
SetThreadDesktop
MessageBoxA
wsprintfA
UnhookWindowsHookEx
OpenWindowStationA
SetProcessWindowStation
CloseDesktop
CloseWindowStation
IsWindow
SendMessageA
DispatchMessageA
MessageBoxA
waveInUnprepareHeader
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveInStop
waveInClose
waveInOpen
listen
setsockopt
bind
socket
htons
send
select
getsockname
htons
accept
WSAStartup
closesocket
recv
inet_addr
gethostbyname
inet_ntoa
WSASocketA
connect
CreateStreamOnHGlobal
Sdfghjkli
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ