Install
RundllInstall
RundllUninstall
ServiceMain
Behavioral task
behavioral1
Sample
a955eb210ba9b770eee38104bcff1869_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a955eb210ba9b770eee38104bcff1869_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a955eb210ba9b770eee38104bcff1869_JaffaCakes118
Size
117KB
MD5
a955eb210ba9b770eee38104bcff1869
SHA1
c7a70857ae2f7c3e811015ef6dd30fdd25140561
SHA256
895e4d859c6768acb6019507e443def2e6acfe65fac163ea69ce8dae43e3b8cf
SHA512
88f4b3a4a4a1ab5e83d884a4ecc05d2069e792cf58868e4065999aa3990dd7a6d06678a6199260db5143398b689456ca1a17f409f1452476c8e5d3858f6f49e2
SSDEEP
1536:0Kkd8Zt31cNxDydIOT8naRqoseZS/pGoB+sfG+++++++++++E6++++++W++d+++/:0R8v3C0qW8/pGoB+sfyNNq0hehGN1
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
a955eb210ba9b770eee38104bcff1869_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
GetFileSize
CreateFileA
FreeConsole
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
InterlockedExchange
GetCurrentProcessId
GetCurrentThreadId
MoveFileExA
LCMapStringW
LCMapStringA
Process32Next
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
WinExec
lstrcpynA
GetModuleFileNameA
CreateThread
WaitForSingleObject
OpenProcess
CreateToolhelp32Snapshot
Process32First
FlushFileBuffers
Module32First
lstrcmpiA
SetLastError
lstrlenA
lstrcpyA
GetCurrentProcess
lstrcatA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FindNextFileA
FindClose
LoadLibraryA
GetProcAddress
GetLogicalDriveStringsA
GetDriveTypeA
FreeLibrary
Sleep
CreatePipe
CloseHandle
GetStartupInfoA
GetSystemDirectoryA
IsBadCodePtr
IsBadReadPtr
SetFilePointer
WriteFile
CreateProcessA
ReadFile
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetFileType
GetStdHandle
SetHandleCount
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapSize
HeapReAlloc
TerminateProcess
RtlUnwind
RaiseException
HeapFree
HeapAlloc
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
GetCommandLineA
GetVersion
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetUnhandledExceptionFilter
ExitWindowsEx
CreateWindowExA
CloseWindow
SendMessageA
keybd_event
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
mouse_event
SetCursorPos
wsprintfA
GetDesktopWindow
IsWindow
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetThreadDesktop
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
DeleteDC
DeleteObject
CreateServiceA
LookupPrivilegeValueA
OpenProcessToken
SetServiceStatus
RegisterServiceCtrlHandlerA
DeleteService
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
ControlService
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
StartServiceA
QueryServiceStatus
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
AdjustTokenPrivileges
ShellExecuteA
SHGetFileInfoA
SHDeleteKeyA
capGetDriverDescriptionA
capCreateCaptureWindowA
setsockopt
send
recv
gethostbyname
inet_addr
WSAStartup
shutdown
closesocket
connect
socket
htons
sendto
htonl
WSASocketA
Install
RundllInstall
RundllUninstall
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ