hook
hqjb
Behavioral task
behavioral1
Sample
3b0bc0f9dd2012ffdbf74a3a5f3f2d98_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b0bc0f9dd2012ffdbf74a3a5f3f2d98_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3b0bc0f9dd2012ffdbf74a3a5f3f2d98_JaffaCakes118
Size
223KB
MD5
3b0bc0f9dd2012ffdbf74a3a5f3f2d98
SHA1
a4321627094f106c6fc04f208869a5cac8c40956
SHA256
d811b49ceef4e8cabece6e3ab8710c837eb4e70dad880dcee21fb17c7763910c
SHA512
ae3abc5e83221260461e1a6eb091d91ffd5baae85bfb0e80f3214de155244efef436d45ab0350b2b398eebf799144f40e46f38afae6b7e9e7484913173b0897c
SSDEEP
6144:2L+cNwRDnlveSaXhDzPWJ0SijJXbAoKWVDPNEO:0N05EVCJ0DJX0vWVDPNE
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
3b0bc0f9dd2012ffdbf74a3a5f3f2d98_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MessageBoxA
MessageBoxA
FreeLibrary
lstrcatA
GetModuleFileNameA
ExitProcess
LoadLibraryA
GetProcAddress
lstrlenA
VirtualProtect
GetModuleFileNameA
ExitProcess
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
hook
hqjb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ