EndWork
Runing
ServiceMain
Working
Behavioral task
behavioral1
Sample
b0da96508e9fd3cfcc523c0df896f6ff_JaffaCakes118.dll
Resource
win7-20240704-en
Target
b0da96508e9fd3cfcc523c0df896f6ff_JaffaCakes118
Size
144KB
MD5
b0da96508e9fd3cfcc523c0df896f6ff
SHA1
5fc25f0a716574997aec7bd8377611c1fcaba59a
SHA256
97f12e665675445b943d7a3a50e5ebc48c3a8ee458d237d1293b56fa6b7a5daf
SHA512
917bf33e516a2a0cae2903f8a6cd4e6d9e0164fdd41660dcc1eccfe7699cd028d979bc218b6ef9df5976b22426e90efc1d1090d894f3f86521f1c7780fac5de4
SSDEEP
3072:xVvh8Q3aHS4ktdH5lfZbh0tt2/Y4xeIKhYOZLwA06cCPeqovW1:RayjdZ1ZbWi/vxrK7ZLw5qeqou1
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
b0da96508e9fd3cfcc523c0df896f6ff_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindFirstFileA
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
lstrcatA
CreateProcessA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
HeapFree
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GlobalFree
GlobalUnlock
LocalReAlloc
GlobalAlloc
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
OpenProcess
GetCurrentThreadId
GlobalMemoryStatus
GetVersionExA
OpenEventA
SetErrorMode
GetCurrentProcess
GetWindowsDirectoryA
SetFileAttributesA
CopyFileA
ExpandEnvironmentStringsA
GetModuleFileNameA
CreateFileA
GetProcAddress
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
DeleteFileA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
ResetEvent
GetLastError
VirtualAlloc
VirtualFree
DeleteCriticalSection
SetEvent
WaitForSingleObject
Sleep
TerminateThread
CloseHandle
FreeLibrary
LoadLibraryA
GlobalLock
LoadIconA
RegisterClassA
LoadMenuA
CreateWindowExA
CloseWindow
IsWindow
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
SetThreadDesktop
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetCursorPos
GetCursorInfo
DestroyCursor
ReleaseDC
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
DispatchMessageA
PostMessageA
TranslateMessage
CharNextA
wsprintfA
GetWindowTextA
MessageBoxA
LoadCursorA
SendMessageA
keybd_event
MapVirtualKeyA
WindowFromPoint
CloseClipboard
GetStockObject
RegRestoreKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
DeleteService
OpenServiceA
OpenSCManagerA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegOpenKeyA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
StartServiceA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSaveKeyA
RegDeleteKeyA
SHGetSpecialFolderPathA
malloc
_except_handler3
strrchr
_beginthreadex
atoi
wcstombs
_access
free
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strncpy
sprintf
_stricmp
rand
_CxxThrowException
memmove
putchar
ceil
_ftol
srand
strstr
_strrev
__CxxFrameHandler
puts
??2@YAPAXI@Z
??3@YAXPAX@Z
htonl
getsockname
sendto
connect
inet_addr
send
closesocket
select
recv
socket
gethostbyname
htons
setsockopt
WSAStartup
WSACleanup
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
EndWork
Runing
ServiceMain
Working
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ