DeleteOfficeData
GetOfficeData
Behavioral task
behavioral1
Sample
e79a99f73671a482680fff448f5c4679_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e79a99f73671a482680fff448f5c4679_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
e79a99f73671a482680fff448f5c4679_JaffaCakes118
Size
267KB
MD5
e79a99f73671a482680fff448f5c4679
SHA1
2cad67d58d97828eecd101bc00a46db530b0401e
SHA256
006afddc2fdfb5d1dc10f6b3ab6036e6ccfad055ac0713d5bb4091d0bec96c5f
SHA512
bea74d3dcc78d3e7389f3c7a0cd205efa7696dbcb5f659d7f9de17f050108ba38319857cf37bab3c7c6726213aea40450211edaf43cf0215cb9abc00aa4c42b8
SSDEEP
6144:I0F1zuDj5wjr3udZ+DPk3GzSoMI2jRwUIK3JudTJ5Iay1jY:j6/5cjub+DPkyFcVwUtJud15Im
metasploit
encoder/shikata_ga_nai
cobaltstrike
0
http://185.225.19.100:443/viwwwsogou
http://sjbingdu.info:443/viwwwsogou
512
2048
185.225.19.100,/viwwwsogou,sjbingdu.info,/viwwwsogou
AAAACgAAABNIb3N0OiB3d3cuc29nb3UuY29tAAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAfQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuNQAAAAoAAAAiQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlLCBicgAAAAkAAAAEb3A9OQAAAAkAAAAtcXVlcnk9JUU3JUEyJThGJUU1JUJCJUJBJTA5JUU5JUJFJTk2JUU4JUIwJUE5AAAABwAAAAAAAAAPAAAAAwAAAAIAAAALSlNFU1NJT05JRD0AAAAGAAAABkNvb2tpZQAAAAAAAAAAAAAAAAAAAA==
AAAACgAAABZIb3N0OiB3d3cuc29nb3VjZG4uY29tAAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAfQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuNQAAAAcAAAAAAAAADwAAAA0AAAAFAAAABmFwcF9pZAAAAAcAAAABAAAADwAAAAIAAAA1eyJ2ZXJzaW9uIjoiMC4wLjIiLCJzZXJ2aWNlTmFtZSI6ImZ1d3UiLCJwYXJhbUFyZ3MiOnsAAAABAAAAL30sImFjdGlvbk5hbWUiOiwiYWN0aW9uUG9zaXRpb24iOiJob21lLWJhbm5lciJ9AAAABAAAAAAAAA==
GET
POST
5888
240
5300
443
%windir%\syswow64\gpupdate.exe
%windir%\sysnative\gpupdate.exe
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCTlanI8X1WJGDnxRmFi/fGlDPmu7pmCC6vPbMU7WQm9+U5A14hHmwkfrctVx0KIqDKgQpuVTSEhcNR6kcTAOSodlp8PGncQttJxejki/dgPvoustnwEXj+syR3/sbzbcJH+GYsMCae6WXDTjh3zpss8OD75mSGUQY7Gl7GF82E4wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
3.528922368e+09
AAAABAAAAAEAAAGPAAAAAgAAAOgAAAANAAAADwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
/p
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0
0
Checks for missing Authenticode signature.
resource |
---|
e79a99f73671a482680fff448f5c4679_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathStripPathW
StrCmpIW
GetCurrentProcess
CreateFileW
WriteConsoleW
GetModuleHandleW
GetModuleFileNameW
ExitProcess
CreateMutexW
Sleep
GetLastError
VirtualAlloc
VirtualProtect
CloseHandle
GetCommandLineA
GetCurrentThreadId
IsDebuggerPresent
IsProcessorFeaturePresent
SetLastError
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
GetProcessHeap
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WriteFile
LoadLibraryExW
RtlUnwind
HeapAlloc
HeapReAlloc
GetStringTypeW
OutputDebugStringW
LoadLibraryW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
DeleteOfficeData
GetOfficeData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ