DuDuEndWork
DuDuRuning
DuDuWorking
ServiceMain
Behavioral task
behavioral1
Sample
2aaf36c2bd88c06b928f2a23f2482e77_JaffaCakes118.dll
Resource
win7-20240704-en
Target
2aaf36c2bd88c06b928f2a23f2482e77_JaffaCakes118
Size
115KB
MD5
2aaf36c2bd88c06b928f2a23f2482e77
SHA1
c9d0ee89d439df5cfcf7d916b98c6d80d195a37c
SHA256
3fdaaad17d9ad60b4dcaf8031cc06086f07953560bf06617ee41b90c517b999c
SHA512
bf3e790172ae7ebcfab785528293c0a95a8190d43acf8be6094a2686244c3361ded8e5ebdf8f00c4bfa2c978bcee03f7a42853e3c10f2f76bf3cd38f2f309e2d
SSDEEP
3072:BvZW/eED0AH0F565Pl9N4htkU4Ka3YolC2Lwqs980d:HyJUF565l/i3DNotLwqsy0d
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
2aaf36c2bd88c06b928f2a23f2482e77_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
lstrcatA
CreateProcessA
TerminateThread
lstrcmpiA
HeapFree
MapViewOfFile
UnmapViewOfFile
GetModuleHandleA
GlobalFree
GlobalUnlock
FindFirstFileA
GlobalMemoryStatus
GetSystemInfo
GetComputerNameA
GetVersionExA
GetModuleFileNameA
OpenEventA
SetErrorMode
GetCurrentProcess
GetWindowsDirectoryA
SetFileAttributesA
CopyFileA
ExpandEnvironmentStringsA
CreateFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetDiskFreeSpaceExA
GetDriveTypeA
FreeLibrary
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
DeleteFileA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
SetEvent
ResetEvent
GetLastError
WaitForSingleObject
CloseHandle
VirtualAlloc
Sleep
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
LoadLibraryA
GetProcAddress
GetCurrentThreadId
LoadIconA
RegisterClassA
CreateWindowExA
CloseWindow
IsWindow
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetCursorPos
GetCursorInfo
DestroyCursor
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
LoadMenuA
CharNextA
wsprintfA
GetWindowTextA
MessageBoxA
LoadCursorA
BlockInput
SendMessageA
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
GetStockObject
RegSaveKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegCreateKeyExA
OpenServiceA
OpenSCManagerA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegSetKeySecurity
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
StartServiceA
AdjustTokenPrivileges
RegRestoreKeyA
SHGetSpecialFolderPathA
free
malloc
_except_handler3
strrchr
strncat
strchr
_beginthreadex
atoi
strncpy
_access
srand
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
__dllonexit
_onexit
sprintf
ceil
_ftol
puts
_strnicmp
strstr
__CxxFrameHandler
??2@YAPAXI@Z
_CxxThrowException
wcstombs
_strrev
_stricmp
rand
putchar
memmove
??3@YAXPAX@Z
htonl
getsockname
WSASocketA
sendto
connect
inet_addr
send
closesocket
select
recv
socket
gethostbyname
htons
setsockopt
WSACleanup
WSAStartup
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
DuDuEndWork
DuDuRuning
DuDuWorking
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ