AvengerMask
MaskAvenger
ServiceMain
Behavioral task
behavioral1
Sample
95c4214ccc13bd20c05de05474b4fef1_JaffaCakes118.dll
Resource
win7-20240704-en
Target
95c4214ccc13bd20c05de05474b4fef1_JaffaCakes118
Size
104KB
MD5
95c4214ccc13bd20c05de05474b4fef1
SHA1
4491eec77d17549a7c75d9e1c50026f30dfbaf1d
SHA256
659db83f459833cc6f14f63d7278d3ed66660aa0edc13efd2a64b6effa425d8a
SHA512
9afcf7b49cc3218a618ca23a82b4e22f1ddc7bc57fdbdac262848350bbac20c7cc3dca35e3e102c888f46c9e0eef8bcdb0c4b41a6d0134a7fab00543285368b1
SSDEEP
3072:CsMHMeT3lk/NLqK0ODyTvMQBpKCik1rhg:CsMHM+q/09TElCi
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
95c4214ccc13bd20c05de05474b4fef1_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersionExA
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
DeviceIoControl
FreeConsole
LocalSize
lstrcmpiA
GetCurrentThreadId
GlobalMemoryStatus
WaitForMultipleObjects
HeapAlloc
PeekNamedPipe
CreateFileMappingA
MapViewOfFile
GetProcessHeap
HeapFree
GetLocalTime
MoveFileExA
DeleteFileA
MultiByteToWideChar
GetVersion
Process32First
Process32Next
OpenProcess
FreeLibrary
TerminateProcess
SetLastError
GetModuleFileNameA
MoveFileA
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
Sleep
InterlockedExchange
lstrcpyA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
LoadLibraryA
GetProcAddress
CreateThread
CreateEventA
ResumeThread
SetEvent
WaitForSingleObject
DisconnectNamedPipe
CreatePipe
GetStartupInfoA
GlobalSize
GlobalLock
GlobalUnlock
GlobalFree
GetCurrentProcess
UnmapViewOfFile
TerminateThread
CloseHandle
SetUnhandledExceptionFilter
SystemParametersInfoA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
CallNextHookEx
OpenClipboard
GetClipboardData
BlockInput
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
IsWindow
CloseWindow
CreateWindowExA
PostMessageA
GetKeyNameTextA
GetActiveWindow
LoadCursorA
DestroyCursor
GetSystemMetrics
UnhookWindowsHookEx
EmptyClipboard
GetWindowTextA
DispatchMessageA
TranslateMessage
GetMessageA
CharNextA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetProcessWindowStation
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
OpenServiceA
RegQueryValueA
RegCloseKey
DeleteService
ControlService
QueryServiceStatus
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetFileSecurityA
SetSecurityDescriptorDacl
AddAccessAllowedAce
EqualSid
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityA
LookupAccountNameA
OpenSCManagerA
CloseServiceHandle
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
RegQueryValueExA
FreeSid
InitializeAcl
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
SHGetFileInfoA
SHDeleteKeyA
_strrev
_strlwr
_strnicmp
wcstombs
_strnset
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
_strcmpi
atoi
realloc
strchr
strncat
isdigit
strtoul
strncmp
strncpy
strrchr
_except_handler3
malloc
free
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutReset
waveInStart
waveOutGetNumDevs
waveOutPrepareHeader
waveInGetNumDevs
waveOutUnprepareHeader
waveOutClose
waveOutWrite
waveOutOpen
waveInOpen
waveInPrepareHeader
waveInAddBuffer
WSAStartup
WSACleanup
WSAIoctl
connect
htons
getsockname
gethostname
closesocket
send
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
ICSeqCompressFrame
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
AvengerMask
MaskAvenger
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ