HttpCancel
HttpCreateDownloadObj
HttpDownload
HttpInitDownPara
hackkills
Behavioral task
behavioral1
Sample
d65b9cb47159c339d7fa45460cf48079_JaffaCakes118.dll
Resource
win7-20240903-en
Target
d65b9cb47159c339d7fa45460cf48079_JaffaCakes118
Size
118KB
MD5
d65b9cb47159c339d7fa45460cf48079
SHA1
c6351ba68d1cc52abca8f41587a694dc1b25c306
SHA256
5571360a51fc5c00c8cf5bc528f2d90ae6bcc34f7bf074c429a58d91be96afa6
SHA512
9925e198849d18e8f700ba55be0aacc4d62c6d6fbfeacdb2fed98ce494e3c3a2c82d9402f6e67e2a43c0e09062d0cb835422231612394c9e013b48c6bf48670a
SSDEEP
3072:UMHnBdoKcHQods4GT8RmpiNe1pkmn9NZ4:dcHQoG1pCUpk09Nm
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
d65b9cb47159c339d7fa45460cf48079_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
FreeLibrary
CloseHandle
TerminateThread
Sleep
WaitForSingleObject
SetEvent
ResumeThread
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
GetLastError
ResetEvent
InterlockedExchange
CancelIo
GetTickCount
GetLocalTime
GetCurrentProcessId
HeapAlloc
GetProcessHeap
DeleteFileA
CreateDirectoryA
GetFileAttributesA
lstrcpyA
lstrlenA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
CreateProcessA
CreateThread
InitializeCriticalSection
MultiByteToWideChar
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
HeapFree
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
LocalSize
TerminateProcess
GlobalMemoryStatus
GetVersionExA
OpenEventA
SetErrorMode
GetCurrentProcess
GetWindowsDirectoryA
SetFileAttributesA
CopyFileA
ExpandEnvironmentStringsA
GetModuleFileNameA
CreateFileA
RaiseException
strncpy
free
malloc
_except_handler3
strrchr
atoi
strncmp
strchr
_errno
wcscpy
sprintf
_beginthreadex
wcstombs
_access
srand
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
rand
_CxxThrowException
strstr
_ftol
ceil
putchar
memmove
__CxxFrameHandler
puts
_snprintf
??3@YAXPAX@Z
_strrev
_strnicmp
??2@YAPAXI@Z
_stricmp
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
NetLocalGroupAddMembers
NetUserAdd
HttpCancel
HttpCreateDownloadObj
HttpDownload
HttpInitDownPara
hackkills
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ