CreateDriverEvent
LoadDriver
RemoveDriverEvent
StartHook
StopHook
UnloadDriver
Behavioral task
behavioral1
Sample
ae7a6ec22cc50b4c42ae0d967b7a4a93_JaffaCakes118.dll
Resource
win7-20240705-en
Target
ae7a6ec22cc50b4c42ae0d967b7a4a93_JaffaCakes118
Size
188KB
MD5
ae7a6ec22cc50b4c42ae0d967b7a4a93
SHA1
4acba3bc883ab46089fb28c5b4947b4c4cf4d4d4
SHA256
49509d2796b4a2868d8204a704eb91874c31e7c16773bb1d0924c30eba74aae2
SHA512
2f9ed3d56030c59df86d8248ec1b3f791b88cbd5bbc2eadfbe9f9825c63ea2ae6518bd99f59177af8fbb9b9d88a275684a6dd0913a12722fff7273a9f3bfabeb
SSDEEP
3072:pFMiHpBjhPeLndkRrKhoyaZvTeJKmWi7xxMPQSivUzHvFfAPu:HMa1E46W0nMPMCfA
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
ae7a6ec22cc50b4c42ae0d967b7a4a93_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetLastError
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
FreeLibrary
LoadLibraryA
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentProcess
FlushFileBuffers
GetVersion
RtlUnwind
HeapFree
HeapAlloc
GetCommandLineA
RaiseException
HeapSize
HeapReAlloc
GetACP
ExitProcess
TerminateProcess
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
lstrcpynA
lstrcpyA
lstrcatA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalAlloc
GlobalReAlloc
GlobalLock
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
GetModuleFileNameA
TlsAlloc
InitializeCriticalSection
LocalAlloc
GetCurrentThreadId
lstrcmpA
LocalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
DeviceIoControl
GetLastError
CreateEventA
CreateThread
WaitForSingleObject
ResetEvent
Sleep
OutputDebugStringA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
lstrlenA
VirtualAllocEx
WriteProcessMemory
GetProcAddress
CreateRemoteThread
GetTickCount
GetFullPathNameA
GetSystemTime
CreateFileA
SetFilePointer
ReadFile
WriteFile
CloseHandle
WinExec
GetModuleHandleA
EnableWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
IsWindowEnabled
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
WinHelpA
GetClassInfoA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
LoadStringA
UnregisterClassA
UnhookWindowsHookEx
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetTopWindow
MessageBoxA
SendMessageA
FindWindowA
RegisterClassA
GetCapture
GetParent
StartServiceA
ControlService
DeleteService
OpenSCManagerA
CreateServiceA
OpenServiceA
CloseServiceHandle
PathFileExistsA
ord17
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
ScaleWindowExtEx
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
Escape
ExtTextOutA
SetWindowExtEx
PtVisible
RectVisible
TextOutA
CreateBitmap
OpenPrinterA
DocumentPropertiesA
ClosePrinter
CreateDriverEvent
LoadDriver
RemoveDriverEvent
StartHook
StopHook
UnloadDriver
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ