CanUnloadNow
DarkAngel
GetClassObject
RegisterServer
UnregisterServer
Behavioral task
behavioral1
Sample
63da4274a0eaefeb17ab12351438107e_JaffaCakes118.dll
Resource
win7-20240704-en
Target
63da4274a0eaefeb17ab12351438107e_JaffaCakes118
Size
131KB
MD5
63da4274a0eaefeb17ab12351438107e
SHA1
ff18388f799da95ce0559344ee977635f4514695
SHA256
f3ec338bfe9fd248d3e9945c7b8b678d2378950773e648d7f14843e29043db51
SHA512
8841edda8e6c18c6867020c5ad1ec3f6a10693e7c16b5f028aa75c7103f859238e88b1b5594864acb79dc598a32fbc7c468daaee15d0fc2d21a986b310cabaf4
SSDEEP
3072:PWLeYPiFfs8qr+Nw7h+Feu4g8qbACPAKJrV3MIzo47:Bs8qVTohAM1laIUc
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
63da4274a0eaefeb17ab12351438107e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
Sleep
LoadLibraryA
GetProcAddress
LoadIconA
RegisterClassA
LoadMenuA
CreateWindowExA
CloseWindow
IsWindow
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
GetCursorPos
GetCursorInfo
DestroyCursor
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
MapVirtualKeyA
GetMessageA
TranslateMessage
DispatchMessageA
keybd_event
wsprintfA
CharNextA
ExitWindowsEx
GetWindowTextA
MessageBoxA
LoadCursorA
BlockInput
SendMessageA
SetCapture
GetStockObject
SHGetSpecialFolderPathA
calloc
srand
_access
??1type_info@@UAE@XZ
_beginthreadex
_errno
strncmp
strrchr
atoi
_except_handler3
_initterm
malloc
strchr
strncpy
sprintf
rand
_CxxThrowException
strstr
_ftol
ceil
putchar
memmove
__CxxFrameHandler
puts
??3@YAXPAX@Z
??2@YAPAXI@Z
_adjust_fdiv
free
_strnicmp
_strrev
_stricmp
wcstombs
_strcmpi
bind
getpeername
accept
listen
recvfrom
__WSAFDIsSet
getsockname
ntohs
inet_ntoa
htonl
sendto
connect
inet_addr
send
closesocket
select
recv
htons
setsockopt
WSACleanup
WSAStartup
gethostbyname
socket
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
WTSQuerySessionInformationA
WTSFreeMemory
CanUnloadNow
DarkAngel
GetClassObject
RegisterServer
UnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ