CanUnloadNow
DarkAngel
GetClassObject
RegisterServer
UnregisterServer
Behavioral task
behavioral1
Sample
a68743f2a17dbbcb2010cd2f8f8d2f6f_JaffaCakes118.dll
Resource
win7-20240704-en
Target
a68743f2a17dbbcb2010cd2f8f8d2f6f_JaffaCakes118
Size
131KB
MD5
a68743f2a17dbbcb2010cd2f8f8d2f6f
SHA1
6a55d1a77c2f52fc88dabe9e0df6723d0fa17b12
SHA256
743a88b29cfb7f9ceb6af1c778901427799373368d51dbd78331e2b44ae65a22
SHA512
8be8236fddb32b6724a76375ce60ba49c62c5f096f3bf36dfd8e858a1c6a478cdafd60d027d0584f725cb46f5eb2c6c06a3b849046e75fac0489b2a171f74101
SSDEEP
3072:PALeYPiFfs8qr+Nw7h+Feu4g8qbACPAKJr43MIEo47:Ps8qVTohAM1l3Idc
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
a68743f2a17dbbcb2010cd2f8f8d2f6f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
Sleep
LoadLibraryA
GetProcAddress
LoadIconA
RegisterClassA
LoadMenuA
CreateWindowExA
CloseWindow
IsWindow
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
GetCursorPos
GetCursorInfo
DestroyCursor
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
MapVirtualKeyA
GetMessageA
TranslateMessage
DispatchMessageA
keybd_event
wsprintfA
CharNextA
ExitWindowsEx
GetWindowTextA
MessageBoxA
LoadCursorA
BlockInput
SendMessageA
SetCapture
GetStockObject
SHGetSpecialFolderPathA
calloc
srand
_access
??1type_info@@UAE@XZ
_beginthreadex
_errno
strncmp
strrchr
atoi
_except_handler3
_initterm
malloc
strchr
strncpy
sprintf
rand
_CxxThrowException
strstr
_ftol
ceil
putchar
memmove
__CxxFrameHandler
puts
??3@YAXPAX@Z
??2@YAPAXI@Z
_adjust_fdiv
free
_strnicmp
_strrev
_stricmp
wcstombs
_strcmpi
bind
getpeername
accept
listen
recvfrom
__WSAFDIsSet
getsockname
ntohs
inet_ntoa
htonl
sendto
connect
inet_addr
send
closesocket
select
recv
htons
setsockopt
WSACleanup
WSAStartup
gethostbyname
socket
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
WTSQuerySessionInformationA
WTSFreeMemory
CanUnloadNow
DarkAngel
GetClassObject
RegisterServer
UnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ