ServiceMain
main
Behavioral task
behavioral1
Sample
b801bbb697910b0eb999b19bdd60caa0_JaffaCakes118.dll
Resource
win7-20240708-en
Target
b801bbb697910b0eb999b19bdd60caa0_JaffaCakes118
Size
102KB
MD5
b801bbb697910b0eb999b19bdd60caa0
SHA1
6edf5281c95e92263754c40ddcf1912ecc9ba356
SHA256
545c47627d82940c26d9e26b6281b85cc51ca7824bebbb66a0c824270cfb2b7d
SHA512
c99c4d29e7c7b1fdcb078ba0193fee1e6af140f32fa97bf4c5909e96ec30ff47daa1f4681dc41b1470ec55448fd45da2b8f9adb2990c45d706a38ce0b410e8a3
SSDEEP
1536:X3jqmKfckrj3EJbLj8ZHGw4j6yctgttfviaJ/bvmJMpIVm:n+mKfcnJwZmP6yggtVviaxmJMpum
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
b801bbb697910b0eb999b19bdd60caa0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHDeleteKeyA
_strcmpi
_adjust_fdiv
_initterm
_onexit
__dllonexit
calloc
_beginthreadex
wcstombs
realloc
strchr
strncat
printf
time
srand
rand
atoi
strncpy
strrchr
_except_handler3
malloc
free
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
_strnicmp
WSAIoctl
gethostbyname
WSACleanup
connect
WSAStartup
ntohs
recv
closesocket
select
send
inet_addr
sendto
WSASocketA
socket
inet_ntoa
getsockname
gethostname
WSAGetLastError
htons
setsockopt
htonl
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
ord537
ord6648
ord2764
ord4129
ord926
ord924
ord922
ord535
ord858
ord6663
ord860
ord4278
ord2818
ord939
ord6877
ord800
ord540
FreeConsole
LocalSize
SetUnhandledExceptionFilter
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
Process32Next
CreateMutexA
SetErrorMode
OpenEventA
ReleaseMutex
GetVersionExA
GlobalMemoryStatus
WaitForMultipleObjects
PeekNamedPipe
TerminateProcess
DisconnectNamedPipe
CreatePipe
GetStartupInfoA
GlobalSize
GlobalAlloc
GlobalLock
GlobalFree
UnmapViewOfFile
HeapAlloc
CreateFileMappingA
MapViewOfFile
GetProcessHeap
HeapFree
GetLocalTime
MoveFileExA
GetTickCount
ExitThread
OpenProcess
LoadLibraryA
GetProcAddress
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
lstrcatA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FreeLibrary
GlobalUnlock
GetProcessWindowStation
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
PostMessageA
SetCursorPos
WindowFromPoint
OpenWindowStationA
MapVirtualKeyA
keybd_event
SendMessageA
SystemParametersInfoA
BlockInput
DestroyCursor
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetKeyNameTextA
GetActiveWindow
GetWindowTextA
wsprintfA
CharNextA
SetProcessWindowStation
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
mouse_event
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SetCapture
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
RegDeleteValueA
RegDeleteKeyA
CreateProcessAsUserA
LookupPrivilegeValueA
SetTokenInformation
OpenProcessToken
FreeSid
SetServiceStatus
RegisterServiceCtrlHandlerA
DuplicateTokenEx
SetSecurityDescriptorDacl
SHGetFileInfoA
ImmReleaseContext
ImmGetCompositionStringA
ImmGetContext
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
capGetDriverDescriptionA
WTSQueryUserToken
CreateEnvironmentBlock
EnumProcessModules
GetModuleFileNameExA
ServiceMain
main
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ