baijingwan
xiaobing
xiaohua
xiaowen
xiaoxiao
Behavioral task
behavioral1
Sample
293ca459dfeccc788a7c20fbb9e8ee4c_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
293ca459dfeccc788a7c20fbb9e8ee4c_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
293ca459dfeccc788a7c20fbb9e8ee4c_JaffaCakes118
Size
115KB
MD5
293ca459dfeccc788a7c20fbb9e8ee4c
SHA1
ec983c868f171b08a7802880064fa8b0ceeabb13
SHA256
ad59d164c576676383bc62023d609ece336c1fefba9c06fbc12ba18b852fa14d
SHA512
a69ba3dabffedf67ac9fa9fb63ffb9b462e248ce15811bdc63c6b23cb114ed3426428874ce74291505fea3fd6e135a41493b7bb97d001162603db9ecc0f25b1a
SSDEEP
3072:XZiLboO7qW0FdR16pq6R24KadsppNzuqQE/uZdzm:XZI38Vmp2jcsppNzu9XC
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
293ca459dfeccc788a7c20fbb9e8ee4c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalSize
CreatePipe
DisconnectNamedPipe
TerminateThread
GetSystemInfo
ReleaseMutex
GetLocalTime
OpenEventA
FreeConsole
Process32Next
Process32First
MoveFileExA
InterlockedExchange
GetSystemDirectoryA
GlobalAlloc
OpenProcess
VirtualAllocEx
WriteProcessMemory
GetCurrentProcess
SetLastError
MoveFileA
WriteFile
CreateFileA
SetFilePointer
GetFileSize
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLastError
GlobalLock
GlobalUnlock
GlobalFree
HeapAlloc
MapViewOfFile
GetProcessHeap
HeapFree
GetFileAttributesA
GetTickCount
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
FreeLibrary
lstrcatA
lstrlenA
Sleep
CancelIo
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
CreateEventA
SetEvent
LoadLibraryA
GetProcAddress
CloseHandle
SetErrorMode
wsprintfA
CharNextA
BlockInput
SetRect
GetSystemMetrics
ReleaseDC
CloseDesktop
SetThreadDesktop
GetUserObjectInformationA
GetThreadDesktop
PostMessageA
CreateWindowExA
CloseWindow
SendMessageA
IsWindow
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaClose
IsValidSid
ClearEventLogA
OpenEventLogA
OpenProcessToken
FreeSid
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
SetServiceStatus
GetTokenInformation
CloseEventLog
SHGetSpecialFolderPathA
SHGetFileInfoA
SHDeleteKeyA
_strnicmp
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
atoi
realloc
strncat
strncpy
strrchr
_except_handler3
free
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
ceil
_ftol
strstr
_CxxThrowException
strchr
malloc
_strcmpi
getsockname
gethostname
send
select
closesocket
recv
ntohs
socket
gethostbyname
htons
connect
setsockopt
WSAIoctl
WSACleanup
WSAStartup
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
ICSendMessage
baijingwan
xiaobing
xiaohua
xiaowen
xiaoxiao
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ