AntiKaba
ServiceMain
THOOK
Behavioral task
behavioral1
Sample
d1c2b117483cb8c862aef0d4903df899_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1c2b117483cb8c862aef0d4903df899_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d1c2b117483cb8c862aef0d4903df899_JaffaCakes118
Size
74KB
MD5
d1c2b117483cb8c862aef0d4903df899
SHA1
8229bca3bb668aca0b01bdcb3aabe8091202787a
SHA256
50493c02ba71d2f6bf6a80a09c4c4c818615e7effe4cf6145f08c5a520bef4fd
SHA512
1b5733eb733eb226ffb7815a7d5e9690fe9b296a4c7cd23a73b92468253cccddd74f72dd778ca81b373d2562e9bfd3dc0477394442f6b7cf8a083496bef12259
SSDEEP
1536:kyyh6jhLPD1WQdKK40CWMcudMwfiOOawzKFvjV+dHV7e:LhLJEK40TMfMKiOOtzKFvjV+dHV7e
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
d1c2b117483cb8c862aef0d4903df899_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalAlloc
RemoveDirectoryA
ReadFile
MoveFileA
CreateEventA
SetEvent
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FreeLibrary
FindFirstFileA
LocalFree
OpenProcess
TerminateThread
InterlockedExchange
MoveFileExA
ResetEvent
CancelIo
LocalSize
TerminateProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
LocalReAlloc
GetProcAddress
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
HeapAlloc
CreateFileMappingA
MapViewOfFile
GetProcessHeap
HeapFree
CreateFileA
GetFileSize
SetFilePointer
WriteFile
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
FreeConsole
SetUnhandledExceptionFilter
lstrcpyA
GetTickCount
CreateMutexA
SetErrorMode
Sleep
OpenEventA
lstrlenA
ReleaseMutex
WaitForSingleObject
CloseHandle
GetVersionExA
OutputDebugStringA
LoadLibraryA
SetProcessWindowStation
SendMessageA
CloseWindow
CreateWindowExA
CharNextA
GetProcessWindowStation
OpenWindowStationA
IsWindow
wsprintfA
GetWindowThreadProcessId
IsWindowVisible
GetWindowTextA
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
ExitWindowsEx
DeleteService
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
SetServiceStatus
RegisterServiceCtrlHandlerA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCreateKeyA
SHGetFileInfoA
SHDeleteKeyA
_strcmpi
_itoa
_strnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
realloc
malloc
atoi
strchr
??2@YAPAXI@Z
strstr
__CxxFrameHandler
wcstombs
strncpy
??3@YAXPAX@Z
memmove
ceil
_ftol
_except_handler3
free
strrchr
_CxxThrowException
Netbios
InternetCloseHandle
InternetReadFile
InternetOpenA
InternetOpenUrlA
capGetDriverDescriptionA
capCreateCaptureWindowA
ICSeqCompressFrameStart
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICOpen
ICSendMessage
ICSeqCompressFrame
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
WSAIoctl
setsockopt
connect
htons
gethostbyname
getsockname
ntohs
recv
select
send
WSACleanup
gethostname
WSAStartup
socket
closesocket
GetModuleFileNameExA
EnumProcessModules
AntiKaba
ServiceMain
THOOK
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ