GetDllVersion
VulanHookDll
VulanUnHookDll
Behavioral task
behavioral1
Sample
39987fe6d209a385afa0497479ad43d2_JaffaCakes118.dll
Resource
win7-20240708-en
Target
39987fe6d209a385afa0497479ad43d2_JaffaCakes118
Size
1.1MB
MD5
39987fe6d209a385afa0497479ad43d2
SHA1
26a57503461e4ce693ade5921f61f827bb8ae086
SHA256
e7c914e5ad586774f959125eca3df05fc07eb61beb0d145968c8361082a90ca5
SHA512
07c4af074589dd1962c2be66779b71eaac6757829f4dc662ab2f7835b47166f67dae295b1b04308c5a37fac31c55a6ee008de095dcea93e6499411d34d0ce7a5
SSDEEP
24576:GDTKk96eTPzBcTOE6IY02lSLxCSUsjcWWvvpoGvYHtFz16hz:GHKyXzB8Opp0tL0swWWhoZ8h
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
39987fe6d209a385afa0497479ad43d2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
SetWindowsHookExA
strncpy
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
GetDllVersion
VulanHookDll
VulanUnHookDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ