Install
ServiceMain
Behavioral task
behavioral1
Sample
2db17d012d8a88c1074f26cc91fc0647_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2db17d012d8a88c1074f26cc91fc0647_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2db17d012d8a88c1074f26cc91fc0647_JaffaCakes118
Size
89KB
MD5
2db17d012d8a88c1074f26cc91fc0647
SHA1
f0b44efdf4ce2415d0715d3e5bd3176bcdccc189
SHA256
a67d42b38fea1a0a4d3bb76672321250e76526dbd54b8fe79b6e251b3cc2bb07
SHA512
37b4956881206613ac921d338c3b9626386869ecc558e3faf1136b5cdb7b9e67f70b17c1d28270602df422431145a5277910c1f34552ae8032c91e55b634bd74
SSDEEP
1536:lwcaE7Dp39KiIrUcO5isscOi1fjz+L7X6NHvrObd+U1/+nH1:ldV39DgOEss1itjz+XX6NHvrOgU1/61
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
2db17d012d8a88c1074f26cc91fc0647_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileSize
ReadFile
MoveFileA
GetCurrentProcess
GetTickCount
GetTempPathA
GetVersionExA
TerminateThread
WinExec
GetSystemTime
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
RemoveDirectoryA
WaitForMultipleObjects
GlobalMemoryStatus
SetLastError
lstrcmpiA
ExitProcess
GetCommandLineA
GetCurrentThreadId
SetUnhandledExceptionFilter
SetHandleInformation
ReleaseMutex
OpenEventA
CreateMutexA
SetErrorMode
FreeConsole
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
FindFirstFileA
DisableThreadLibraryCalls
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrcpyA
CreateDirectoryA
GetLastError
DeleteFileA
CreateFileA
SetFilePointer
WriteFile
LocalSize
LocalFree
GetWindowsDirectoryA
GetFileAttributesA
lstrlenA
LocalReAlloc
FreeLibrary
LocalAlloc
Sleep
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
LoadLibraryA
GetProcAddress
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
PeekNamedPipe
InitializeCriticalSection
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetInputState
PostThreadMessageA
GetMessageA
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SendMessageA
SystemParametersInfoA
BlockInput
DestroyCursor
LoadCursorA
MessageBoxA
CharNextA
wsprintfA
GetSystemMetrics
RegQueryValueA
RegOpenKeyExA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegCreateKeyA
RegOpenKeyA
CloseServiceHandle
StartServiceA
CreateServiceA
OpenSCManagerA
OpenServiceA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegCloseKey
strchr
realloc
atoi
strncpy
rand
srand
wcstombs
strncat
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strrchr
_except_handler3
free
malloc
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
ceil
_beginthreadex
_strnicmp
memmove
??3@YAXPAX@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
Install
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ