Install
RundllInstall
RundllUninstall
ServiceMain
Behavioral task
behavioral1
Sample
5e278dfe3028ff2bb7b8773fd5f0e47f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5e278dfe3028ff2bb7b8773fd5f0e47f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5e278dfe3028ff2bb7b8773fd5f0e47f_JaffaCakes118
Size
125KB
MD5
5e278dfe3028ff2bb7b8773fd5f0e47f
SHA1
c4d8c903835c1798b0975b3da9999d2424c0d136
SHA256
6724d413cd40f985ff97ad8ce8481eb74bb5db582b1f85b1591f85873e4c2b6a
SHA512
0eacfcce3a22b666d2e45ef874b0f660f6bb3e075fcad452f5480cc85131f23049868a7bd0dea53fe845ce38ca9a0ae9fc75bcb0f3f49ac245fbd4fe09ff4e55
SSDEEP
3072:84mh/kKbogNpLTtTBfDn9sRr5Z1NV5pn9Kw2:fGsWoapXtTBj4r5Z1sw
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
5e278dfe3028ff2bb7b8773fd5f0e47f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
lstrcpynA
WinExec
MoveFileExA
GetTickCount
GetFileSize
CreateFileA
FreeConsole
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
InterlockedExchange
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
CreateThread
SetLastError
FlushFileBuffers
LCMapStringW
LCMapStringA
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
WaitForSingleObject
lstrcpyA
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Module32First
Process32Next
lstrlenA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentProcess
MoveFileA
CopyFileA
DeleteFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
Sleep
GetLogicalDrives
GetDriveTypeA
CreatePipe
CloseHandle
GetStartupInfoA
GetSystemDirectoryA
IsBadCodePtr
IsBadReadPtr
CreateProcessA
ReadFile
SetFilePointer
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetFileType
GetStdHandle
SetHandleCount
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapSize
HeapReAlloc
SetUnhandledExceptionFilter
RtlUnwind
RaiseException
HeapFree
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
GetCommandLineA
GetVersion
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetProcessWindowStation
wsprintfA
GetDesktopWindow
mouse_event
SetCursorPos
keybd_event
ExitWindowsEx
CreateWindowExA
CloseWindow
SendMessageA
IsWindow
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
CloseWindowStation
CloseDesktop
GetThreadDesktop
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
DeleteDC
DeleteObject
RegCreateKeyA
LookupPrivilegeValueA
OpenProcessToken
SetServiceStatus
RegisterServiceCtrlHandlerA
DeleteService
CreateServiceA
RegOpenKeyA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
ControlService
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
StartServiceA
CloseServiceHandle
QueryServiceStatus
AdjustTokenPrivileges
ShellExecuteA
SHGetFileInfoA
capGetDriverDescriptionA
capCreateCaptureWindowA
WSASocketA
htonl
sendto
setsockopt
send
recv
gethostbyname
inet_addr
WSAStartup
shutdown
closesocket
connect
socket
htons
StrStrIA
Install
RundllInstall
RundllUninstall
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ