SetHook
UnHook
Behavioral task
behavioral1
Sample
d0674e10329917ec1ff41fe3291f9cdb_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0674e10329917ec1ff41fe3291f9cdb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d0674e10329917ec1ff41fe3291f9cdb_JaffaCakes118
Size
88KB
MD5
d0674e10329917ec1ff41fe3291f9cdb
SHA1
d68d8a87d672af4cb481f4a69878cef17f5583ff
SHA256
9b7e524b32c7a26692fb6a37362dde4cc7bbb2190c5179f62d6708f31cdac813
SHA512
616c4b5e8292349cce6d5d23bc0b749fe2bfb05cd3a51936b3a6f13a4f621a1cae72e5eb74107de82a7f51d8300f400541e36955f2e18691494527dacfd4a243
SSDEEP
768:kpoViFwTF1HHu2qO8vDbJf4bD1w3k99bRhT5/PLduoYCdgiyBWkzB8qrqRtApj+K:BL/8vZ4u+T9ZuoPy4kzLYtApitdi
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
d0674e10329917ec1ff41fe3291f9cdb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpiA
WideCharToMultiByte
OutputDebugStringA
VirtualProtectEx
GetCurrentProcess
CloseHandle
Module32Next
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
Sleep
TerminateProcess
CreateThread
GetCurrentProcessId
GetModuleHandleA
GetLocalTime
FlushFileBuffers
LCMapStringW
LCMapStringA
SetStdHandle
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
InterlockedIncrement
RtlUnwind
HeapAlloc
HeapFree
GetCommandLineA
GetVersion
RaiseException
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
ExitProcess
HeapReAlloc
HeapSize
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
SetFilePointer
InterlockedDecrement
UnhookWindowsHookEx
SetWindowsHookExA
MessageBoxA
wsprintfA
CallNextHookEx
GetWindowTextA
HttpQueryInfoA
InternetReadFile
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
InternetOpenA
HttpSendRequestA
GetAdaptersInfo
SetHook
UnHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ