HeixueMain
Startup
Static task
static1
Behavioral task
behavioral1
Sample
17855703dfc7f2bdf04cd9ce80c3a497_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
17855703dfc7f2bdf04cd9ce80c3a497_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
17855703dfc7f2bdf04cd9ce80c3a497_JaffaCakes118
Size
109KB
MD5
17855703dfc7f2bdf04cd9ce80c3a497
SHA1
1f1a114bf1fb2eb7bdafd34cc2c23652e42175ea
SHA256
2b2123ec56f581a396762c87b1d0bd64f776db9378cdbb2a980e3bc35291e0c9
SHA512
fd363d8982f906e62b796da985664a5b417cad94f7345b45ded904327a633f8b971167da81f725f51a7c4493bcfb0a06693254bdb3de194073468455447cf37c
SSDEEP
1536:EGwwddp6I6em1VuY3DnicJx8fhku6Z502/40mDOOz:lwwdnkniuxehkus502/40mDOU
Checks for missing Authenticode signature.
resource |
---|
17855703dfc7f2bdf04cd9ce80c3a497_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
DeviceIoControl
GlobalMemoryStatus
MapViewOfFile
GetProcessHeap
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GetLocalTime
GetTickCount
MoveFileExA
HeapAlloc
HeapFree
ReleaseMutex
CreateFileMappingA
TerminateThread
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
InitializeCriticalSection
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
ExitThread
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
mouse_event
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
EmptyClipboard
ReleaseDC
keybd_event
GetCursorInfo
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
IsWindow
SystemParametersInfoA
SendMessageA
BlockInput
MapVirtualKeyA
wsprintfA
DestroyCursor
GetCursorPos
LoadCursorA
CallNextHookEx
SetWindowsHookExA
GetDesktopWindow
UnhookWindowsHookEx
CharNextA
ExitWindowsEx
GetThreadDesktop
OpenDesktopA
PostMessageA
CreateWindowExA
CloseWindow
GetKeyNameTextA
GetActiveWindow
GetWindowTextA
MessageBoxA
BitBlt
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
DeleteDC
SelectObject
CreateDIBSection
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserA
GetTokenInformation
LookupAccountSidA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegSetKeySecurity
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
SHGetSpecialFolderPathA
SHGetFileInfoA
SHDeleteKeyA
_strnicmp
_except_handler3
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
realloc
strncat
atoi
strncpy
strcat
strrchr
_strcmpi
free
strcmp
malloc
strcpy
strchr
_CxxThrowException
memcmp
??2@YAPAXI@Z
memset
__CxxFrameHandler
strstr
strlen
_ftol
ceil
memmove
memcpy
??3@YAXPAX@Z
getsockname
gethostname
send
select
closesocket
recv
ntohs
socket
gethostbyname
htons
setsockopt
WSAIoctl
WSACleanup
WSAStartup
connect
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
capGetDriverDescriptionA
capCreateCaptureWindowA
ICSeqCompressFrame
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
EnumProcessModules
GetModuleFileNameExA
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationA
HeixueMain
Startup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ