CH
JustforFun1
JustforFun2
JustforFun3
ServiceMain
Behavioral task
behavioral1
Sample
fcc92a5c6c2f5534be3dd967f1f5cde3_JaffaCakes118.dll
Resource
win7-20240215-en
Target
fcc92a5c6c2f5534be3dd967f1f5cde3_JaffaCakes118
Size
68KB
MD5
fcc92a5c6c2f5534be3dd967f1f5cde3
SHA1
41bc38068eb4b988040e525a0d8dbb4e195bf5d7
SHA256
b947392e9dc843552fa0f103f0721872ec184b27a65247005a1e5f74f368f315
SHA512
d99c13d573496bf9e82e49a03128998543254d3c36a3b8e78033f2cf8dca606d8cc55a60fd1d886f94cb702e22b42c15c07476b5413a7b42acb39eac8e743746
SSDEEP
1536:NUw/HyslBvrq9HDFuuX8SkThRAKecdIhf3/8NY5kK7Up:NUw/HyslBcuuXLkYKe+IR3/8akK7Up
Processes:
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
Processes:
resource |
---|
fcc92a5c6c2f5534be3dd967f1f5cde3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MoveFileA
GetTempPathA
GetModuleFileNameA
SetLastError
GetCurrentProcess
VirtualAllocEx
OpenProcess
TerminateThread
GetWindowsDirectoryA
GetLocalTime
GetVersionExA
GetTickCount
ReleaseMutex
OpenEventA
WriteFile
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
CreateProcessA
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetDriveTypeA
lstrcatA
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
Sleep
CancelIo
InterlockedExchange
FreeLibrary
SetEvent
WaitForSingleObject
lstrcpyA
ResetEvent
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
LoadLibraryA
GetProcAddress
SetErrorMode
wsprintfA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
CharNextA
CloseDesktop
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyA
RegQueryValueExA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
RegOpenKeyExA
RegQueryValueA
RegCloseKey
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegisterServiceCtrlHandlerA
SetServiceStatus
SHGetFileInfoA
SHDeleteKeyA
_strnicmp
_strnset
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
_CxxThrowException
??2@YAPAXI@Z
free
malloc
_except_handler3
strrchr
strncpy
strtok
strncat
strchr
realloc
atoi
wcstombs
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_strcmpi
select
ntohs
closesocket
socket
gethostbyname
recv
send
gethostname
getsockname
htons
connect
WSAStartup
WSAIoctl
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
capGetDriverDescriptionA
CH
JustforFun1
JustforFun2
JustforFun3
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ