Install
RundllInstall
RundllUninstall
ServiceMain
Behavioral task
behavioral1
Sample
f6869864417789ee39b40555f30d67c2_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f6869864417789ee39b40555f30d67c2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
f6869864417789ee39b40555f30d67c2_JaffaCakes118
Size
72KB
MD5
f6869864417789ee39b40555f30d67c2
SHA1
32cb2abf989047adce63292f2e64f6fd9023f36a
SHA256
7f395a983193452c4c8adfb36c9baa89ebbf50978a7417d5d9e0b93eb927e88c
SHA512
6c339b916db837e1cad46d2eb31f789a607c7af3bcd9dc2588e9af1a9a101968c0b3ad10839dfa32d0dc71f13e138afe13f855f4a107077c58d1016e14b65c0e
SSDEEP
1536:vfLW66I/odXXgFnToIf2CRHr5ZHNzUl8MSTHt33GHvIQ:7odXXgtTBf2CRHr5ZHNzUOMwHt3WH
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
f6869864417789ee39b40555f30d67c2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpynA
WinExec
MoveFileExA
GetTickCount
OutputDebugStringA
GetFileSize
CreateFileA
WriteFile
FreeConsole
GetModuleFileNameA
GetVersionExA
GetComputerNameA
InterlockedExchange
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
CreateThread
WaitForSingleObject
lstrcpyA
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Module32First
Process32Next
lstrlenA
SetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentProcess
MoveFileA
CopyFileA
DeleteFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
Sleep
FindNextFileA
FindClose
GetDriveTypeA
CreatePipe
CloseHandle
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
ReadFile
GlobalMemoryStatus
keybd_event
ExitWindowsEx
mouse_event
CreateWindowExA
CloseWindow
SendMessageA
IsWindow
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseDesktop
CloseWindowStation
SetCursorPos
GetDesktopWindow
wsprintfA
CreateCompatibleBitmap
BitBlt
CreateDCA
DeleteDC
CreateCompatibleDC
SelectObject
DeleteObject
GetDIBits
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerA
DeleteService
CreateServiceA
RegOpenKeyA
RegCreateKeyA
RegOpenKeyExA
RegSetValueExA
QueryServiceStatus
CloseServiceHandle
StartServiceA
ChangeServiceConfigA
OpenServiceA
OpenSCManagerA
ControlService
RegCloseKey
StrStrIA
ShellExecuteA
SHGetFileInfoA
strstr
_adjust_fdiv
_initterm
free
_onexit
__dllonexit
??1type_info@@UAE@XZ
malloc
rand
wcstombs
_ftol
_strlwr
strcspn
atoi
??3@YAXPAX@Z
_except_handler3
_CxxThrowException
__CxxFrameHandler
??2@YAPAXI@Z
strncpy
strncat
sprintf
capCreateCaptureWindowA
capGetDriverDescriptionA
setsockopt
send
recv
gethostbyname
inet_addr
WSAStartup
shutdown
closesocket
connect
socket
htons
sendto
htonl
WSASocketA
WSAIoctl
Install
RundllInstall
RundllUninstall
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ