Install
Launch
ServiceMain
UnInstall
Behavioral task
behavioral1
Sample
3c2509cffd36b1ef4c1b79dc18011d94_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c2509cffd36b1ef4c1b79dc18011d94_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3c2509cffd36b1ef4c1b79dc18011d94_JaffaCakes118
Size
374KB
MD5
3c2509cffd36b1ef4c1b79dc18011d94
SHA1
6d80b9c455ac86a80d4c417c9a98262671d21ac6
SHA256
fa4c3102ec237e9ec1e0e60c8f3b3299d41cf9599bc42c284d11b0550d313e22
SHA512
7e4be62076e39ac235214c817dc90a2ff18817f2dc1d0a1889ffa9af22e2a4bc2c8344205df6bc867e30d0c2a504dd6f31f602a20464175213172bb7878aebf3
SSDEEP
6144:r+aF516uSMMA8cJfmBuzy3E9PNi6MOhIhAP9ojRcI31cwpRPEA2aAk/yJaHiBW:tF516uNMAhJfmBuW3eli6MYISPmVTtEO
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
3c2509cffd36b1ef4c1b79dc18011d94_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
inet_ntoa
WSAStartup
select
connect
WSAIoctl
getpeername
getsockname
gethostbyname
closesocket
socket
recv
send
gethostname
htons
ntohs
setsockopt
WSACleanup
InternetOpenW
InternetReadFile
InternetCloseHandle
InternetOpenUrlW
StrStrW
StrStrIW
StrCmpIW
StrRChrW
ImmGetCompositionStringW
ImmReleaseContext
ImmGetContext
mixerSetControlDetails
mixerGetNumDevs
mixerGetDevCapsW
mixerGetLineInfoW
mixerClose
mixerGetControlDetailsW
waveInStart
mixerGetLineControlsW
waveOutUnprepareHeader
waveInAddBuffer
waveInOpen
waveInPrepareHeader
waveOutReset
waveOutPrepareHeader
waveOutGetNumDevs
waveOutOpen
mixerOpen
waveInUnprepareHeader
waveOutWrite
waveInClose
waveOutClose
waveInReset
waveInGetNumDevs
GetModuleFileNameExW
EnumProcessModules
CreateEnvironmentBlock
GetModuleHandleA
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
TlsSetValue
LCMapStringW
LCMapStringA
HeapReAlloc
HeapAlloc
HeapFree
GetProcessHeap
WaitForSingleObject
SetEvent
GetTickCount
Sleep
CreateEventW
CloseHandle
lstrlenW
WideCharToMultiByte
lstrcpyW
ResetEvent
CancelIo
GetFileSize
FindFirstFileW
SetFilePointer
GetDriveTypeW
SetErrorMode
CreateProcessW
GetLogicalDriveStringsW
CreateDirectoryW
WriteFile
GetFileAttributesW
ReadFile
CreateFileW
lstrcmpW
GetLastError
MoveFileW
FindClose
RemoveDirectoryW
lstrcatW
FindNextFileW
GetDiskFreeSpaceExW
DeleteFileW
LocalFree
GetVolumeInformationW
GetCurrentProcess
TerminateThread
lstrcpynW
GetModuleFileNameW
InterlockedExchange
GetExitCodeThread
WaitForMultipleObjects
MapViewOfFile
UnmapViewOfFile
VirtualQuery
LoadLibraryW
GetProcAddress
GetLocalTime
CreateFileMappingW
OutputDebugStringW
SetUnhandledExceptionFilter
GetModuleHandleW
FormatMessageW
IsBadWritePtr
FlushFileBuffers
GlobalSize
GlobalLock
InitializeCriticalSection
GlobalAlloc
LeaveCriticalSection
GlobalUnlock
EnterCriticalSection
GlobalFree
DeleteCriticalSection
lstrcmpiW
GetCurrentThreadId
GetCommandLineW
GetEnvironmentVariableW
SetPriorityClass
lstrlenA
GetCurrentThread
SetProcessPriorityBoost
GetVersionExW
GetExitCodeProcess
SetThreadPriority
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
GetShortPathNameW
lstrcpyA
PeekNamedPipe
TerminateProcess
GetStartupInfoW
DisconnectNamedPipe
CreatePipe
ExpandEnvironmentStringsW
OpenProcess
HeapSize
LocalSize
MultiByteToWideChar
GlobalHandle
CreateThread
ExitThread
GetCommandLineA
UnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
ExitProcess
RaiseException
GetStdHandle
GetModuleFileNameA
HeapCreate
HeapDestroy
VirtualFree
VirtualAlloc
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
VirtualProtect
GetModuleFileNameA
ExitProcess
SetWindowsHookExW
GetKeyNameTextW
GetActiveWindow
GetWindowTextW
CallNextHookEx
wvsprintfW
mouse_event
SetClipboardData
SendMessageW
GetSystemMetrics
OpenClipboard
BlockInput
DestroyCursor
EmptyClipboard
SystemParametersInfoW
GetClipboardData
SetCursorPos
WindowFromPoint
LoadCursorW
UnhookWindowsHookEx
MapVirtualKeyW
CloseClipboard
keybd_event
GetCursorPos
GetDesktopWindow
ReleaseDC
SetRect
GetCursorInfo
GetDC
GetUserObjectInformationW
SetThreadDesktop
CloseDesktop
OpenDesktopW
OpenInputDesktop
PostMessageW
GetThreadDesktop
GetWindow
GetWindowRect
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
DispatchMessageW
TranslateMessage
GetMessageW
ExitWindowsEx
CharNextW
wsprintfW
GetClientRect
CreateWindowExW
CloseWindow
SetCapture
MessageBoxA
BitBlt
DeleteDC
CreateDIBSection
GetDIBits
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
CreateServiceW
AdjustTokenPrivileges
RegSetValueExW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
AllocateAndInitializeSid
AddAccessAllowedAce
FreeSid
GetLengthSid
ControlService
RegisterServiceCtrlHandlerW
SetServiceStatus
RegDeleteValueW
QueryServiceStatus
DuplicateTokenEx
StartServiceW
ChangeServiceConfig2W
SetTokenInformation
RegOpenKeyW
CreateProcessAsUserW
RegQueryValueExW
RegCreateKeyExW
OpenServiceW
OpenSCManagerW
DeleteService
CloseServiceHandle
OpenProcessToken
RegQueryValueW
RegOpenKeyExW
RegCloseKey
LookupPrivilegeValueW
ShellExecuteExW
SHChangeNotify
SHGetFileInfoW
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemFree
SysFreeString
Install
Launch
ServiceMain
UnInstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ