CancelDll
LoadDll
Behavioral task
behavioral1
Sample
0506cb4ecbd692aedbcaf6829bb9231f_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0506cb4ecbd692aedbcaf6829bb9231f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
0506cb4ecbd692aedbcaf6829bb9231f_JaffaCakes118
Size
76KB
MD5
0506cb4ecbd692aedbcaf6829bb9231f
SHA1
df02bb3c38eb28e35b8b12d157eaf1039dd7d384
SHA256
1c5b5361f9e1f0b5baf294a06fc753d9de948a0ccc328baac50fbac57df6518a
SHA512
7d8ec9bed200fa3338b9cde1d55c9c2d4e116c5280b099e47c6808173e3d775dd8dff48a7edbf23be08583d2afa02e1fd18cc6f3b7f1b31e236f5ab83f3253d2
SSDEEP
1536:Axxum8ensPyi5vyWOJ7DPFl/th2lCCZpGU3lVFd86rGZs+6Mh9cKNVpqi:ATumL+yiKL7ralPHBvdBiUMJVQi
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
0506cb4ecbd692aedbcaf6829bb9231f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
WritePrivateProfileStringA
GetWindowsDirectoryA
IsBadStringPtrW
Module32Next
Module32First
CreateToolhelp32Snapshot
DeleteFileA
GetTempPathA
CreateFileMappingA
GetFileAttributesW
ReadProcessMemory
VirtualQueryEx
WideCharToMultiByte
GetPrivateProfileStringA
GetFileSize
CreateFileA
GetModuleHandleA
CreateThread
SetFilePointer
HeapAlloc
GetProcessHeap
OutputDebugStringA
OpenProcess
TerminateProcess
GetCurrentProcess
Sleep
GetCurrentThreadId
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetProcAddress
LoadLibraryA
ReadFile
FreeLibrary
GetKeyboardState
GetDC
GetWindowRect
wvsprintfA
UnhookWindowsHookEx
CallNextHookEx
SendMessageA
GetClassNameW
wsprintfA
SetWindowsHookExA
ToAscii
GetWindowThreadProcessId
AttachThreadInput
GetFocus
FindWindowA
GetWindow
DeleteUrlCacheEntry
URLDownloadToFileA
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
wcslen
_strcmpi
time
srand
wcscpy
wcsstr
exit
printf
rand
strstr
strrchr
strncpy
malloc
_stricmp
tolower
_vsnprintf
_ltoa
_strupr
wcsncat
memset
sprintf
strcpy
??3@YAXPAX@Z
wcscmp
??2@YAPAXI@Z
fclose
ftell
fseek
fopen
mbstowcs
_except_handler3
strlen
memcpy
free
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ