DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
TMethodImplementationIntercept
Behavioral task
behavioral1
Sample
eb69a47bedc6abe9e2248ab02b1b53a2_JaffaCakes118.dll
Resource
win7-20240903-en
Target
eb69a47bedc6abe9e2248ab02b1b53a2_JaffaCakes118
Size
12.2MB
MD5
eb69a47bedc6abe9e2248ab02b1b53a2
SHA1
4f374fa910325cf5c2e7b550084416a9da21ce88
SHA256
dd73cb0e0a5285ee7f7e79a14fb18137c2329d67e0c22f3c2da0b03de412a6e6
SHA512
2780bdea9f02b89505d31847b9167bcbb751ac84f34708f563e87cf19aa595db47def6458fc6a3525d0d89c90ee5434b79704d561ad47b90130fc088bdc436bb
SSDEEP
393216:EMhHLwGmU5yynaby7+Zpb/F//alBfHk8I:JpwGmL6WEUpjF/il5
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
eb69a47bedc6abe9e2248ab02b1b53a2_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SafeArrayPtrOfIndex
CreateErrorInfo
RegQueryValueExW
RegUnLoadKeyW
CharNextW
SetClassLongW
EnumDisplayMonitors
GetUserObjectInformationW
GetProcessWindowStation
GetUserObjectInformationW
GetVersion
GetProcAddress
GetVersionExW
GetVersion
Sleep
VirtualQuery
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
WidenPath
GetRandomRgn
VerQueryValueW
OleCreatePictureIndirect
CreateStreamOnHGlobal
CoUninitialize
InitializeFlatSB
isxdigit
SHFileOperationW
SHGetFolderPathW
SHGetMalloc
ChooseFontW
OpenPrinterW
GetDefaultPrinterW
timeGetTime
LresultFromObject
PathFileExistsW
WTSSendMessageW
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
TMethodImplementationIntercept
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ