Install
ServiceMain
Behavioral task
behavioral1
Sample
1c3068cfe46370e9f230a5bca6a3dc1a_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1c3068cfe46370e9f230a5bca6a3dc1a_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
1c3068cfe46370e9f230a5bca6a3dc1a_JaffaCakes118
Size
77KB
MD5
1c3068cfe46370e9f230a5bca6a3dc1a
SHA1
67d6e2914ece41e26a22e662ab77ed080cb2da90
SHA256
28bd5ac44cf62f7d4f74fe6230f07df9514bf4abd93f43949ff41897f1f2f3df
SHA512
4f1326e2ff96d11642a8a58d3a44057c52b8784f0eb680f679f0228c3d366603b4eee140aa1d7a5e1f25afbc52a0c281d7932b9c60f151ff3d0b4f3d5db54895
SSDEEP
1536:pwcaElDp39KiIrUcO5isscOi1fjz+LeX6NHAraPnH1:pTV39DgOEss1itjz+CX6NHAraP1
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
1c3068cfe46370e9f230a5bca6a3dc1a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileSize
ReadFile
MoveFileA
GetCurrentProcess
GetTickCount
GetTempPathA
GetVersionExA
TerminateThread
WinExec
GetSystemTime
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
RemoveDirectoryA
WaitForMultipleObjects
GlobalMemoryStatus
SetLastError
lstrcmpiA
ExitProcess
GetCommandLineA
GetCurrentThreadId
SetUnhandledExceptionFilter
SetHandleInformation
ReleaseMutex
OpenEventA
CreateMutexA
SetErrorMode
FreeConsole
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
FindFirstFileA
DisableThreadLibraryCalls
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrcpyA
CreateDirectoryA
GetLastError
DeleteFileA
CreateFileA
SetFilePointer
WriteFile
LocalSize
LocalFree
GetWindowsDirectoryA
GetFileAttributesA
lstrlenA
LocalReAlloc
FreeLibrary
LocalAlloc
Sleep
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
LoadLibraryA
GetProcAddress
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
PeekNamedPipe
InitializeCriticalSection
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetInputState
PostThreadMessageA
GetMessageA
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SendMessageA
SystemParametersInfoA
BlockInput
DestroyCursor
LoadCursorA
MessageBoxA
CharNextA
wsprintfA
GetSystemMetrics
RegQueryValueA
RegOpenKeyExA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegCreateKeyA
RegOpenKeyA
CloseServiceHandle
StartServiceA
CreateServiceA
OpenSCManagerA
OpenServiceA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegCloseKey
strchr
realloc
atoi
strncpy
rand
srand
wcstombs
strncat
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strrchr
_except_handler3
free
malloc
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
ceil
_beginthreadex
_strnicmp
memmove
??3@YAXPAX@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
Install
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ