Fun
JustTempFun
hacker
sgaiycll
xhjjj
xhjjje
xhjjjq
xhjjjw
Behavioral task
behavioral1
Sample
2986fd31375887b6e2e9a1020aafce73_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2986fd31375887b6e2e9a1020aafce73_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2986fd31375887b6e2e9a1020aafce73_JaffaCakes118
Size
140KB
MD5
2986fd31375887b6e2e9a1020aafce73
SHA1
dcf1fe158fa1a21a43962f4af0130b2f9b810d5a
SHA256
4d802667738557b30e720820ed325eec2a8bab17e4d8f107b3cecbe79120d623
SHA512
2426295996544767a2df6a1a9151aacf4dc7a193bd1d6550d60b95162d924b0d618b0a0529f6bdb57ed440f9ff5995a8c013d41506556323cdc03f6702289c3a
SSDEEP
3072:C9nfBQphkrW1QWaRPoKOcnaHXd4Os2PG/MMAan1:MnJQphkmxafhMXmB2eUMAA
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
2986fd31375887b6e2e9a1020aafce73_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
UnmapViewOfFile
LocalSize
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatusEx
HeapAlloc
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
OutputDebugStringA
GetTempPathA
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
CreateFileMappingA
MapViewOfFile
GetVersion
GetProcessHeap
GetCurrentProcess
ExitProcess
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
MoveFileA
HeapFree
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
GetFileAttributesA
FreeLibrary
LoadLibraryA
GetProcAddress
GetTickCount
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
CreateEventA
InitializeCriticalSection
CreateThread
GetLocalTime
MoveFileExA
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
Beep
WriteFile
DeviceIoControl
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
GetSystemInfo
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
GetWindowRect
GetKeyNameTextA
GetClipboardData
UnhookWindowsHookEx
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
IsWindow
CloseWindow
CreateWindowExA
GetActiveWindow
GetWindowTextA
SwapMouseButton
MoveWindow
GetSystemMetrics
CallNextHookEx
SendMessageA
OpenClipboard
GetForegroundWindow
CharNextA
MessageBoxA
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfA
ShowWindow
EmptyClipboard
FindWindowA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
GetProcessWindowStation
OpenWindowStationA
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
RegQueryValueA
IsValidSid
OpenProcessToken
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
LsaOpenPolicy
LsaFreeMemory
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryInfoKeyA
EnumServicesStatusA
QueryServiceConfigA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupAccountSidA
GetTokenInformation
LookupAccountNameA
SHGetSpecialFolderPathA
SHGetFileInfoA
SHDeleteKeyA
_stricmp
_strnicmp
_strrev
_strcmpi
_adjust_fdiv
_initterm
calloc
_beginthreadex
wcstombs
atol
realloc
strncat
wcscpy
_errno
strchr
strncmp
atoi
strrchr
malloc
free
_except_handler3
strncpy
sprintf
puts
putchar
rand
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
waveOutClose
waveInStop
waveOutWrite
waveOutUnprepareHeader
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutReset
waveInClose
waveInStart
waveInUnprepareHeader
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
mciSendStringA
waveInReset
ntohs
recv
gethostbyname
htons
setsockopt
WSAIoctl
WSACleanup
WSAStartup
closesocket
select
send
inet_addr
sendto
gethostname
__WSAFDIsSet
recvfrom
listen
accept
getpeername
bind
getsockname
inet_ntoa
htonl
socket
WSASocketA
connect
InternetReadFile
InternetCloseHandle
InternetOpenA
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
NetLocalGroupAddMembers
NetUserAdd
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
ICOpen
ICSeqCompressFrameEnd
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICClose
ICCompressorFree
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationA
EnumProcessModules
GetModuleFileNameExA
Fun
JustTempFun
hacker
sgaiycll
xhjjj
xhjjje
xhjjjq
xhjjjw
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ