AedDokc
avgavg
hackcanke
mxiangh
Behavioral task
behavioral1
Sample
5fabb7b345a9a236ff1f0bb6720055d7_JaffaCakes118.dll
Resource
win7-20240704-en
Target
5fabb7b345a9a236ff1f0bb6720055d7_JaffaCakes118
Size
141KB
MD5
5fabb7b345a9a236ff1f0bb6720055d7
SHA1
927125d76a3f9e192668217f6f7f5be39294ffaa
SHA256
69eeadc205886edb9961b0d3bb722073fd4a818b44505ec8319954da147bc26d
SHA512
22aa88efacbcccf2af2b3d50ed2268428964e0e5e945f45a590eb9f1782fb8baa8fc6a28a33cac6ca9edd4ad46b73a5b956c3bbdd6742cc495df8cb4b62078ba
SSDEEP
3072:+70Yd0QO+PCw1ARe02D9u1mzMQC32nT+ZaI86sYoZWuJQb:M0b+PlZhxuENCGqZHZcZWIu
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
5fabb7b345a9a236ff1f0bb6720055d7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFilePointer
MoveFileA
CreateProcessA
WinExec
WriteFile
CreateFileA
CreateThread
InitializeCriticalSection
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
HeapFree
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
LocalSize
GlobalFree
ReadFile
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
TerminateProcess
OpenProcess
GlobalMemoryStatus
OpenEventA
SetErrorMode
GetCurrentProcess
SetFileAttributesA
CopyFileA
CreateEventA
ExpandEnvironmentStringsA
GetModuleFileNameA
GetFileSize
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
GetFileAttributesA
CreateDirectoryA
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
GetWindowsDirectoryA
lstrcpyA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
ResetEvent
GetLastError
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
ResumeThread
SetEvent
WaitForSingleObject
Sleep
TerminateThread
CloseHandle
FreeLibrary
LoadLibraryA
GetProcAddress
GlobalUnlock
wsprintfA
CharNextA
GetWindowTextA
MessageBoxA
LoadCursorA
BlockInput
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
GetMessageA
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
DestroyCursor
GetCursorInfo
GetCursorPos
ExitWindowsEx
GetWindowThreadProcessId
LoadIconA
RegisterClassA
LoadMenuA
TranslateMessage
DispatchMessageA
SetClipboardData
CreateWindowExA
CloseWindow
IsWindow
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetStockObject
GetLengthSid
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
DeleteService
OpenServiceA
OpenSCManagerA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegRestoreKeyA
RegSaveKeyA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
RegOpenKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
StartServiceA
AdjustTokenPrivileges
LookupPrivilegeValueA
SHGetSpecialFolderPathA
_strcmpi
_strrev
_except_handler3
_strnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
srand
_access
wcstombs
_beginthreadex
wcscpy
_errno
strncmp
atoi
strrchr
_stricmp
free
malloc
strchr
strncpy
sprintf
rand
_CxxThrowException
strstr
_ftol
ceil
putchar
memmove
__CxxFrameHandler
puts
??3@YAXPAX@Z
??2@YAPAXI@Z
getsockname
bind
getpeername
accept
listen
recvfrom
__WSAFDIsSet
ntohs
inet_ntoa
htonl
WSASocketA
sendto
connect
inet_addr
send
closesocket
select
socket
gethostbyname
htons
setsockopt
WSAStartup
WSACleanup
WSAIoctl
recv
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
NetUserAdd
NetLocalGroupAddMembers
WTSFreeMemory
WTSQuerySessionInformationA
AedDokc
avgavg
hackcanke
mxiangh
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ