RunDllHostCallBack
_�����ӳ���
��TX������
Behavioral task
behavioral1
Sample
4a9638c553f13ed398588e77eec49dc4_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4a9638c553f13ed398588e77eec49dc4_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4a9638c553f13ed398588e77eec49dc4_JaffaCakes118
Size
828KB
MD5
4a9638c553f13ed398588e77eec49dc4
SHA1
e5237f300f5c2c69c5153f4643dc4c759c9668db
SHA256
ad839f51d5eec6b15713375ee792fed9aefc559fb13333aadcd542a76d85b73b
SHA512
435e8faa7d6bf91d8871815414dd148f819be03035d2766d8afebc1b9adefb7d8f09d8fc99dae75db23823c8ec55db97a9398c142595d4fbf6eeac5e0aae4ea3
SSDEEP
24576:qRWuzyd7PKY4RlvNwsDfLztB3w7ZujxrYHMCRQfElHun:HgyRiYIn5DfL73nNrYfQME
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
4a9638c553f13ed398588e77eec49dc4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
midiStreamRestart
WSAAsyncSelect
GetVersion
GetModuleHandleA
GetProcAddress
VirtualProtect
GetSubMenu
OffsetViewportOrgEx
OpenPrinterA
RegOpenKeyExA
ShellExecuteA
OleInitialize
LoadTypeLi
ord17
GetSaveFileNameA
RunDllHostCallBack
_�����ӳ���
��TX������
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ