Install
ServiceMain
Behavioral task
behavioral1
Sample
JaffaCakes118_4eec95ddd3a200d5267ad5d268b9b0b4.dll
Resource
win7-20241023-en
Target
JaffaCakes118_4eec95ddd3a200d5267ad5d268b9b0b4
Size
93KB
MD5
4eec95ddd3a200d5267ad5d268b9b0b4
SHA1
433e7deb163d69d9de2495efc26403bfb0b87800
SHA256
2a69b3eb2f254e0bbe89787d81e5e874aa49af33b33355e4efde5f9f214b8cb4
SHA512
8c13360aeba70ee50bf7388bf18aa63bc291f4d8a86e9d6b3ea70f58ccfe78abcb00d2691a8c42e4438c4d64b19401a8209db7269ff99c52875af88b8dd69951
SSDEEP
1536:ANx1NpOvjkUa61qABhrYdlcgsXRzXkFXtJx8PlHXpra9+sJiZixMexk1JKjpHTN0:ANx1ukPEXr/1tXkFdJiPlHZO9+v2hxNF
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_4eec95ddd3a200d5267ad5d268b9b0b4 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileSize
ReadFile
MoveFileA
GetCurrentProcess
GetTickCount
GetTempPathA
GetVersionExA
TerminateThread
WinExec
GetSystemTime
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
RemoveDirectoryA
WaitForMultipleObjects
GlobalMemoryStatus
SetLastError
lstrcmpiA
ExitProcess
GetCommandLineA
GetCurrentThreadId
SetUnhandledExceptionFilter
SetHandleInformation
ReleaseMutex
OpenEventA
CreateMutexA
SetErrorMode
FreeConsole
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
FindFirstFileA
DisableThreadLibraryCalls
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrcpyA
CreateDirectoryA
GetLastError
DeleteFileA
CreateFileA
SetFilePointer
WriteFile
LocalSize
LocalFree
GetWindowsDirectoryA
GetFileAttributesA
lstrlenA
LocalReAlloc
FreeLibrary
LocalAlloc
Sleep
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
LoadLibraryA
GetProcAddress
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
PeekNamedPipe
InitializeCriticalSection
VirtualProtect
GetModuleFileNameA
ExitProcess
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetInputState
PostThreadMessageA
GetMessageA
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SendMessageA
SystemParametersInfoA
BlockInput
DestroyCursor
LoadCursorA
MessageBoxA
CharNextA
wsprintfA
GetSystemMetrics
MessageBoxA
RegQueryValueA
RegOpenKeyExA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegCreateKeyA
RegOpenKeyA
CloseServiceHandle
StartServiceA
CreateServiceA
OpenSCManagerA
OpenServiceA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegCloseKey
strchr
realloc
atoi
strncpy
rand
srand
wcstombs
strncat
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strrchr
_except_handler3
free
malloc
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
ceil
_beginthreadex
_strnicmp
memmove
??3@YAXPAX@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
Install
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ