Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
c1aba87cf03fa1daa107b81b150b6746_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1aba87cf03fa1daa107b81b150b6746_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c1aba87cf03fa1daa107b81b150b6746_JaffaCakes118
Size
167KB
MD5
c1aba87cf03fa1daa107b81b150b6746
SHA1
f4e746cc058c7d57a7e37b870b77c9c563ecb22e
SHA256
efcb2aa980b55a7010a47b916ee1ee2eccfd5904d2f20ff389d4441f5eda3ec2
SHA512
bb8d27254096a826da0aa14dc4028bf3bb23a5cb416530dc246a6241021702403596318c8bfead3d92d2f55b743b0e25e493dfc8c7d160ad614170b4e32aecb2
SSDEEP
3072:cx4eYvA3Ls9i3NE7z7d4QGLBKbKXW2atV+QVo5D9ePY2hwQoayB:c0ALa8NEf7WvGVtzeDbzaS
resource | yara_rule |
---|---|
sample | vmprotect |
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SizeofResource
FindResourceA
DeleteFileA
WideCharToMultiByte
TerminateProcess
OpenProcess
Process32Next
lstrcmpiA
Process32First
FreeLibrary
GetProcAddress
LoadLibraryA
GetCurrentProcessId
GetCurrentProcess
lstrcpyA
GetPrivateProfileStringA
GlobalUnlock
GlobalLock
CreateDirectoryA
LeaveCriticalSection
TryEnterCriticalSection
InitializeCriticalSection
LocalFree
LocalUnlock
LocalLock
LocalAlloc
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleA
ExitProcess
GetSystemDirectoryA
GetLocaleInfoW
CreateThread
LoadResource
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
GetStringTypeA
HeapCreate
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
MultiByteToWideChar
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapFree
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
EnterCriticalSection
DeleteCriticalSection
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetVersion
GetCommandLineA
RtlUnwind
WaitForSingleObject
Sleep
GetFileSize
ReadFile
VirtualFree
GetWindowsDirectoryA
CreateFileA
SetFilePointer
WriteFile
GetLocalTime
CloseHandle
GetLastError
VirtualAlloc
GetExitCodeThread
TerminateThread
GlobalAlloc
GlobalFree
lstrlenA
GetWindowThreadProcessId
SendMessageA
IsWindowVisible
GetSystemMetrics
GetWindowRect
keybd_event
GetCursorPos
GetKeyState
MessageBoxA
wsprintfA
ReleaseDC
GetDC
EnumWindows
FindWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
ScreenToClient
SetWindowsHookExA
IsWindow
CallNextHookEx
SetForegroundWindow
UnhookWindowsHookEx
PtInRect
GetForegroundWindow
GetSystemPaletteEntries
GetDIBits
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
GetDeviceCaps
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ShellExecuteA
DnsRecordListFree
DnsQuery_A
setsockopt
ioctlsocket
select
inet_addr
WSAStartup
WSACleanup
socket
htons
inet_ntoa
connect
gethostname
closesocket
send
recv
gethostbyname
GetModuleFileNameExA
EnumProcesses
EnumProcessModules
COMResModuleInstance
SetInsertHook
UnInsertHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ