InstallHook
MainMonitor
Start
init
init_FXRun
init_FXSetup
init_PPRun
init_PPSetup
init_ZMRun
Behavioral task
behavioral1
Sample
db441e61157cc8c189fd0801b471b3f7_JaffaCakes118.dll
Resource
win7-20240729-en
Target
db441e61157cc8c189fd0801b471b3f7_JaffaCakes118
Size
64KB
MD5
db441e61157cc8c189fd0801b471b3f7
SHA1
4be2bff720b4669868abfc228bcad625f5d14e5b
SHA256
005fcfbc7d025129975e57d3d58fbfb58f24e75425e137e96a010ffd93d10c6b
SHA512
5f6b8c47e6d1e1a09eb5e059fa965d4655317317f0f0c6c7178f83c2dfbda50a58e19e54f2e6fbe696cd1b4cf4d8b86c32b196c1a60a5cae54a66ba13ac2e7e8
SSDEEP
1536:5STKjsAltWAZteP/nq0FogvIJ3X/vYpzRq:5sKIAltvWPVogv0HYp9q
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
db441e61157cc8c189fd0801b471b3f7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteProcessMemory
VirtualProtectEx
CreateProcessW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcess
CreateRemoteThread
GetModuleHandleW
VirtualAllocEx
WritePrivateProfileStringW
MoveFileW
GetPrivateProfileIntW
GetPrivateProfileStringW
DeleteFileW
FindClose
SetFileAttributesW
FindFirstFileW
GetFileSize
ResumeThread
MultiByteToWideChar
GetExitCodeThread
CreateThread
ReadFile
GetCommandLineW
LoadLibraryW
FlushFileBuffers
GetStringTypeW
GetStringTypeA
RtlUnwind
SetStdHandle
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
CloseHandle
GetProcAddress
GetCurrentProcessId
Sleep
OpenProcess
TerminateProcess
GetSystemDirectoryW
CreateFileW
SetFilePointer
WideCharToMultiByte
WriteFile
GetStartupInfoA
GetFileType
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetModuleHandleA
SetHandleCount
GetStdHandle
VirtualProtect
EnumWindows
GetSystemMetrics
SetThreadDesktop
OpenDesktopW
SetProcessWindowStation
OpenWindowStationW
ShowWindow
GetWindowLongW
GetDlgItem
PostMessageW
SendMessageW
SetForegroundWindow
DestroyWindow
GetWindowThreadProcessId
EnumChildWindows
SetCapture
WaitForInputIdle
GetClassNameW
MoveWindow
GetParent
GetWindowTextW
FindWindowW
gethostname
gethostbyname
WSAStartup
URLDownloadToFileW
Netbios
waveOutGetVolume
waveOutSetVolume
ImpersonateLoggedOnUser
RegDeleteKeyW
RegEnumValueW
RegCreateKeyW
RegOpenKeyExW
RegSetValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
CreateProcessAsUserW
OpenProcessToken
DuplicateTokenEx
SHGetSpecialFolderPathW
InstallHook
MainMonitor
Start
init
init_FXRun
init_FXSetup
init_PPRun
init_PPSetup
init_ZMRun
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ