??0CPl@@QAE@XZ
??4CPl@@QAEAAV0@ABV0@@Z
?InstallH@@YAHDDHH@Z
?fnMlangl@@YAHXZ
?init@@YAHXZ
?nMlangl@@3HA
Behavioral task
behavioral1
Sample
b273bddcf2f3500b50fdc1da4a52dfc5_JaffaCakes118.dll
Resource
win7-20240729-en
Target
b273bddcf2f3500b50fdc1da4a52dfc5_JaffaCakes118
Size
96KB
MD5
b273bddcf2f3500b50fdc1da4a52dfc5
SHA1
b31ed8aff186477bb938f360dd29f3ce72fbd1c2
SHA256
34473be612e8ed42ba926b4d0f0c88dd4c9a3a0e495cb239f97eb849364d3754
SHA512
00581f2a4c532caaf76a2a4b801c95bf36228f177edfc82ec823d30f7bd71e87f11829807c6cea288c7226f19091a10d9cce48366e32edccf8e206f279ed627a
SSDEEP
1536:2O8gK8TaL0dacuToZB+SLkE9PoamhrS/duMo8+kXKyOw7SIW5nRz209DzEgocL9g:2IRaLojYS7m5S/duVk7OvRhggtLCj
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
b273bddcf2f3500b50fdc1da4a52dfc5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualProtectEx
GetCurrentProcess
GetCurrentProcessId
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetLastError
CreateMutexA
GetStringTypeW
GetStringTypeA
LCMapStringW
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
LCMapStringA
RtlUnwind
FindWindowA
??0CPl@@QAE@XZ
??4CPl@@QAEAAV0@ABV0@@Z
?InstallH@@YAHDDHH@Z
?fnMlangl@@YAHXZ
?init@@YAHXZ
?nMlangl@@3HA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ