ServiceMain
UninstallServer
Behavioral task
behavioral1
Sample
bdafed0b53fdd556cb152a5985ee612c_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdafed0b53fdd556cb152a5985ee612c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
bdafed0b53fdd556cb152a5985ee612c_JaffaCakes118
Size
114KB
MD5
bdafed0b53fdd556cb152a5985ee612c
SHA1
16c5cc4701edd2d0061052cde46437831ba5eccb
SHA256
24929f8e1580d94d97327a49b6bd1979fa9822227f90bb40470da2299bff05a9
SHA512
414ebaa3e5caa109a426902030863a62a7c9159035b7637c4d6231dd978920065205eb78fe2c7b7ec443562562f40c3f6f8e3c5c7c6ee43b41d9cd5e41dba843
SSDEEP
3072:IdpgMxsdSyg4TvtcMk8Lyzb8ckivlu5KViCbmN:Mpl2GkGMkSgb8Svlu5KVON
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
bdafed0b53fdd556cb152a5985ee612c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CopyFileA
MoveFileExA
GetTickCount
GetLocalTime
HeapFree
GetProcessHeap
MapViewOfFile
CreateFileMappingA
HeapAlloc
UnmapViewOfFile
LocalSize
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
GetVersion
PeekNamedPipe
WaitForMultipleObjects
GetPrivateProfileStringA
ReleaseMutex
CreateMutexA
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
DisableThreadLibraryCalls
FreeConsole
GetModuleHandleA
ExitProcess
lstrcmpiA
GetCurrentThreadId
FreeLibrary
CreateRemoteThread
WritePrivateProfileStringA
GetCurrentProcess
GetSystemDirectoryA
SetLastError
OutputDebugStringA
GetModuleFileNameA
CreateToolhelp32Snapshot
Process32First
OpenProcess
Process32Next
GlobalMemoryStatus
GetVersionExA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
LoadLibraryA
GetProcAddress
Sleep
CancelIo
InterlockedExchange
ResetEvent
InterlockedDecrement
WideCharToMultiByte
InterlockedIncrement
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
CreateEventA
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
CreatePipe
TranslateMessage
GetMessageA
DispatchMessageA
GetThreadDesktop
OpenDesktopA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
GetClientRect
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
CreateWindowExA
CharNextA
keybd_event
wsprintfA
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
ShowWindow
PostMessageA
EnumWindows
GetWindowThreadProcessId
IsWindowVisible
ExitWindowsEx
FindWindowA
CreateDIBSection
CreateCompatibleDC
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
DeleteObject
SelectObject
InitializeSecurityDescriptor
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceA
LockServiceDatabase
ChangeServiceConfigA
RegQueryValueA
RegOpenKeyExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegQueryInfoKeyA
RegSetValueExA
CloseServiceHandle
EnumServicesStatusA
OpenSCManagerA
QueryServiceConfigA
OpenServiceA
DeleteService
ControlService
QueryServiceStatus
UnlockServiceDatabase
SHGetFileInfoA
CoTaskMemFree
CoUninitialize
CoInitialize
CoCreateInstance
SysFreeString
_strlwr
rename
_strrev
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
atoi
realloc
strchr
strncat
sprintf
_strnicmp
isdigit
strtoul
strncmp
strncpy
strrchr
_except_handler3
malloc
free
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutGetNumDevs
waveOutOpen
waveOutWrite
getsockname
gethostname
send
closesocket
recv
select
socket
gethostbyname
htons
connect
setsockopt
WSAIoctl
WSAStartup
WSACleanup
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
EnumProcessModules
GetModuleFileNameExA
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetReadFile
ServiceMain
UninstallServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ