ServiceMain
UninstallServer
Behavioral task
behavioral1
Sample
88260d25d8851594f2fc0cd0a56d661b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
88260d25d8851594f2fc0cd0a56d661b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
88260d25d8851594f2fc0cd0a56d661b_JaffaCakes118
Size
114KB
MD5
88260d25d8851594f2fc0cd0a56d661b
SHA1
9079e2c42c99439d1b3e63ec8516cd8bc56bd5b2
SHA256
2f244e874c86f20b007063d1c95cd38d6154665e9baff63c15ba02899fd99a59
SHA512
846e3f2e486931d72d623aca2436934b31f22d1a55cd883ddc57a692bfa0b3d8a6d955e2fe651812967f4c8804f73cf9a7a1dcb6de04f54592f2235293386252
SSDEEP
3072:IdpgMxsdSyg4TvtcMk8Lyzb8ckivlu5KuiCbmN:Mpl2GkGMkSgb8Svlu5KuON
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
88260d25d8851594f2fc0cd0a56d661b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CopyFileA
MoveFileExA
GetTickCount
GetLocalTime
HeapFree
GetProcessHeap
MapViewOfFile
CreateFileMappingA
HeapAlloc
UnmapViewOfFile
LocalSize
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
GetVersion
PeekNamedPipe
WaitForMultipleObjects
GetPrivateProfileStringA
ReleaseMutex
CreateMutexA
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
DisableThreadLibraryCalls
FreeConsole
GetModuleHandleA
ExitProcess
lstrcmpiA
GetCurrentThreadId
FreeLibrary
CreateRemoteThread
WritePrivateProfileStringA
GetCurrentProcess
GetSystemDirectoryA
SetLastError
OutputDebugStringA
GetModuleFileNameA
CreateToolhelp32Snapshot
Process32First
OpenProcess
Process32Next
GlobalMemoryStatus
GetVersionExA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
LoadLibraryA
GetProcAddress
Sleep
CancelIo
InterlockedExchange
ResetEvent
InterlockedDecrement
WideCharToMultiByte
InterlockedIncrement
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
CreateEventA
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
CreatePipe
TranslateMessage
GetMessageA
DispatchMessageA
GetThreadDesktop
OpenDesktopA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
GetClientRect
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
CreateWindowExA
CharNextA
keybd_event
wsprintfA
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
ShowWindow
PostMessageA
EnumWindows
GetWindowThreadProcessId
IsWindowVisible
ExitWindowsEx
FindWindowA
CreateDIBSection
CreateCompatibleDC
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
DeleteObject
SelectObject
InitializeSecurityDescriptor
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceA
LockServiceDatabase
ChangeServiceConfigA
RegQueryValueA
RegOpenKeyExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegQueryInfoKeyA
RegSetValueExA
CloseServiceHandle
EnumServicesStatusA
OpenSCManagerA
QueryServiceConfigA
OpenServiceA
DeleteService
ControlService
QueryServiceStatus
UnlockServiceDatabase
SHGetFileInfoA
CoTaskMemFree
CoUninitialize
CoInitialize
CoCreateInstance
SysFreeString
_strlwr
rename
_strrev
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
atoi
realloc
strchr
strncat
sprintf
_strnicmp
isdigit
strtoul
strncmp
strncpy
strrchr
_except_handler3
malloc
free
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutGetNumDevs
waveOutOpen
waveOutWrite
getsockname
gethostname
send
closesocket
recv
select
socket
gethostbyname
htons
connect
setsockopt
WSAIoctl
WSAStartup
WSACleanup
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
EnumProcessModules
GetModuleFileNameExA
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetReadFile
ServiceMain
UninstallServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ