ServiceMain
wintest
Behavioral task
behavioral1
Sample
ed39ef38d00f720dd30f3cbc29f66eb8_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed39ef38d00f720dd30f3cbc29f66eb8_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
ed39ef38d00f720dd30f3cbc29f66eb8_JaffaCakes118
Size
95KB
MD5
ed39ef38d00f720dd30f3cbc29f66eb8
SHA1
461f9108bff7bd08b2f497f92837a8226fed0f73
SHA256
6d7ab8ec9776f658a17b768d99c8bdb7921120dec2bcef771876fb157adc2f86
SHA512
f896e5706ac92e46eb091edf16150dda8e18fada9d77a5d944eac5758371f17ecda1197c2e950f5e69159ac625eedf0790b209b69c712c040f9f20783c64864f
SSDEEP
1536:jYfLXl8SY5Eq+8f7QtdEc1Nifc0qppgbfwQZkQcexLC:MfmSY52NdECN0c0qwbwQZkQcexLC
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
ed39ef38d00f720dd30f3cbc29f66eb8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MapViewOfFile
CreateFileMappingA
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
SetFilePointer
GetProcessHeap
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
MoveFileExA
OpenProcess
VirtualAllocEx
HeapFree
GetLocalTime
WaitForMultipleObjects
GetTickCount
ReadFile
WriteProcessMemory
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
CreateRemoteThread
GetCurrentProcess
Process32First
Process32Next
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
MoveFileA
CreateFileA
WriteFile
SetEvent
WaitForSingleObject
CreateEventA
TerminateThread
CloseHandle
PeekNamedPipe
WindowFromPoint
SetCursorPos
mouse_event
SetCapture
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
CloseClipboard
SetRect
keybd_event
GetCursorInfo
GetCursorPos
GetDC
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
SendMessageA
SystemParametersInfoA
BlockInput
MapVirtualKeyA
DispatchMessageA
DestroyCursor
ReleaseDC
LoadCursorA
GetKeyNameTextA
CallNextHookEx
SetWindowsHookExA
GetSystemMetrics
TranslateMessage
GetMessageA
wsprintfA
CharNextA
GetWindowTextA
GetActiveWindow
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
PostMessageA
CreateWindowExA
CloseWindow
IsWindow
UnhookWindowsHookEx
DeleteDC
DeleteObject
CreateDCA
BitBlt
CreateDIBSection
SelectObject
CreateCompatibleBitmap
GetDIBits
CreateCompatibleDC
LsaClose
LsaOpenPolicy
LsaRetrievePrivateData
LookupAccountNameA
IsValidSid
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupAccountSidA
GetTokenInformation
LsaFreeMemory
SHGetSpecialFolderPathA
SHGetFileInfoA
SHDeleteKeyA
_strlwr
_strnicmp
_strrev
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
atoi
realloc
strncat
strncpy
strrchr
_except_handler3
free
malloc
strchr
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
_strcmpi
waveInStop
waveInReset
waveInUnprepareHeader
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveInClose
waveOutReset
waveOutClose
waveOutWrite
waveOutGetNumDevs
waveOutPrepareHeader
waveOutUnprepareHeader
waveOutOpen
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
getsockname
gethostname
send
socket
ntohs
recv
closesocket
select
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetCloseHandle
InternetOpenA
InternetReadFile
InternetOpenUrlA
capGetDriverDescriptionA
capCreateCaptureWindowA
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrame
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationA
CreateEnvironmentBlock
EnumProcessModules
GetModuleFileNameExA
ServiceMain
wintest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ