AltTab1_Enable_Disable
AltTab2_Enable_Disable
Clock_Show_Hide
CtrlAltDel_Enable_Disable
Desktop_Show_Hide
Keys_Enable_Disable
StartButton_Show_Hide
TaskManager_Enable_Disable
TaskSwitching_Enable_Disable
Taskbar_Show_Hide
Behavioral task
behavioral1
Sample
LockScreen/LockDll.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LockScreen/LockDll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
LockScreen/LockScreen.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
LockScreen/LockScreen.exe
Resource
win10v2004-20240802-en
Target
de730cb1c2da65fa3bf4334e9be9f301_JaffaCakes118
Size
523KB
MD5
de730cb1c2da65fa3bf4334e9be9f301
SHA1
6180fbf9429c62dc59a2349688f9865d5da3bf58
SHA256
069ce847b4f40e401e7d8bcedac9b95114a3e582b4b303304358f2648d73e0b5
SHA512
a54db587668bb146e3b9a34b51fc03e6945b980fa928cfa0623effb880e9e86a632d51a49b364f9eb22df230811b6c8b0010ef6c156c2e423807ecfcb3fffcbf
SSDEEP
12288:rs+9cbydKNs9ntUHZeE4TF3WvyadV5RsIMnUarJ:rtu+hQeEKF3WL57UJ
resource | yara_rule |
---|---|
static1/unpack001/LockScreen/LockScreen.exe | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
unpack001/LockScreen/LockDll.dll |
unpack001/LockScreen/LockScreen.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetExitCodeThread
WaitForSingleObject
VirtualFreeEx
CreateRemoteThread
GetVersionExA
LoadLibraryA
MultiByteToWideChar
GetModuleFileNameA
GetCurrentThreadId
OpenProcess
GetModuleHandleA
GetProcAddress
FreeLibrary
SetLastError
GetCurrentProcess
VirtualAllocEx
WriteProcessMemory
RtlUnwind
ExitProcess
LCMapStringW
LCMapStringA
InterlockedIncrement
InterlockedDecrement
GetOEMCP
GetACP
GetCPInfo
WriteFile
HeapAlloc
HeapFree
CloseHandle
GetCommandLineA
GetVersion
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
TerminateProcess
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
IsWindowUnicode
CallNextHookEx
GetDesktopWindow
WindowFromPoint
SetWindowPos
FindWindowA
UnhookWindowsHookEx
SetWindowsHookExA
UpdateWindow
GetAsyncKeyState
RegisterHotKey
UnregisterHotKey
SystemParametersInfoA
GetDlgItem
ShowWindow
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegSetValueExA
RegDeleteValueA
RegCreateKeyA
RegOpenKeyA
AltTab1_Enable_Disable
AltTab2_Enable_Disable
Clock_Show_Hide
CtrlAltDel_Enable_Disable
Desktop_Show_Hide
Keys_Enable_Disable
StartButton_Show_Hide
TaskManager_Enable_Disable
TaskSwitching_Enable_Disable
Taskbar_Show_Hide
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE