COMResModuleInstance
SetInsertHook
UnInsertHook
Behavioral task
behavioral1
Sample
5bf9b7f0d7a106d4c9b0293770c6504d_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5bf9b7f0d7a106d4c9b0293770c6504d_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5bf9b7f0d7a106d4c9b0293770c6504d_JaffaCakes118
Size
164KB
MD5
5bf9b7f0d7a106d4c9b0293770c6504d
SHA1
e6e543c0cb3a9b964c7b5f2fb4f970300cae33a9
SHA256
2d512e402f73a1b27049cfe0176a6cf3d49dcc10d9c4f3f17c8fc81b4f1e08cc
SHA512
ac0c0f734581037162e3f5f3a976b9df8394d2a54b97308ba5dc06ebd0fabbefa3b9096fab0928b9606808dac1ea178c405b56cb68dec07a1aa28fce143d3ad3
SSDEEP
3072:xK3GJv6379i3NE7zad4Q6LBKPKQW2atV+QVo5dhNSLl/zE:xpah8NEfaWbFVtzevNKzE
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
5bf9b7f0d7a106d4c9b0293770c6504d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SizeofResource
FindResourceA
DeleteFileA
WideCharToMultiByte
TerminateProcess
OpenProcess
Process32Next
lstrcmpiA
Process32First
FreeLibrary
GetProcAddress
LoadLibraryA
GetCurrentProcessId
GetCurrentProcess
lstrcpyA
GetPrivateProfileStringA
GlobalUnlock
GlobalLock
CreateDirectoryA
LeaveCriticalSection
TryEnterCriticalSection
InitializeCriticalSection
LocalFree
LocalUnlock
LocalLock
LocalAlloc
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleA
ExitProcess
GetSystemDirectoryA
GetLocaleInfoW
CreateThread
LoadResource
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
GetStringTypeA
HeapCreate
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
MultiByteToWideChar
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapFree
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
EnterCriticalSection
DeleteCriticalSection
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetVersion
GetCommandLineA
RtlUnwind
WaitForSingleObject
Sleep
GetFileSize
ReadFile
VirtualFree
GetWindowsDirectoryA
CreateFileA
SetFilePointer
WriteFile
GetLocalTime
CloseHandle
GetLastError
VirtualAlloc
GetExitCodeThread
TerminateThread
GlobalAlloc
GlobalFree
lstrlenA
GetWindowThreadProcessId
SendMessageA
IsWindowVisible
GetSystemMetrics
GetWindowRect
keybd_event
GetCursorPos
GetKeyState
MessageBoxA
wsprintfA
ReleaseDC
GetDC
EnumWindows
FindWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
ScreenToClient
SetWindowsHookExA
IsWindow
CallNextHookEx
SetForegroundWindow
UnhookWindowsHookEx
PtInRect
GetForegroundWindow
GetSystemPaletteEntries
GetDIBits
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
GetDeviceCaps
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ShellExecuteA
DnsRecordListFree
DnsQuery_A
setsockopt
ioctlsocket
select
inet_addr
WSAStartup
WSACleanup
socket
htons
inet_ntoa
connect
gethostname
closesocket
send
recv
gethostbyname
GetModuleFileNameExA
EnumProcesses
EnumProcessModules
COMResModuleInstance
SetInsertHook
UnInsertHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ