SetKBHook
StopKBHook
Behavioral task
behavioral1
Sample
7614135bdce8aed0f6f803aff1ede6c9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7614135bdce8aed0f6f803aff1ede6c9_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
7614135bdce8aed0f6f803aff1ede6c9_JaffaCakes118
Size
60KB
MD5
7614135bdce8aed0f6f803aff1ede6c9
SHA1
25f9fe6440d037d887371f3a75a62f99f5d1e998
SHA256
b463745b170ff09795358b1795715d8f2f418ff61e9c519b8b9846e19e75c48c
SHA512
8a92b7685b026a336053f638cba2876594d740231d2136bde5f48c69589c4287db16610e71b44db8c351d80e0d78436c65fc3417db4338a2720b34bf4024036c
SSDEEP
768:k91vX/mCfw05jwqTa8aAqzK3dOdNio7LdbhHDGlWUvYkO6MfO92A0:cf15j5Tl2e3d0io7LjjGlHv86H2
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
7614135bdce8aed0f6f803aff1ede6c9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateDirectoryA
GetWindowsDirectoryA
GetModuleHandleA
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
GetLastError
FlushFileBuffers
WriteFile
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
HeapFree
CloseHandle
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapAlloc
SetStdHandle
SetFilePointer
CreateFileA
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetEndOfFile
ReadFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
RtlUnwind
KillTimer
UnhookWindowsHookEx
SetWindowsHookExA
SetTimer
GetForegroundWindow
GetWindowTextA
EnumChildWindows
SendMessageA
GetKeyboardState
GetAsyncKeyState
GetKeyState
CallNextHookEx
SetKBHook
StopKBHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ