DeleteInstallFile
FirstRun
ServiceMain
UninstallServer
Behavioral task
behavioral1
Sample
da8273d8e58286c10b04a0c6fc5ba1ae_JaffaCakes118.dll
Resource
win7-20240903-en
Target
da8273d8e58286c10b04a0c6fc5ba1ae_JaffaCakes118
Size
124KB
MD5
da8273d8e58286c10b04a0c6fc5ba1ae
SHA1
72835bf3dd85a80bc3587b94d9ec1514564a0a92
SHA256
e2d2ecd1119e48b92ab222190f296fe853cabcc21843673293acaa04df0dc361
SHA512
782461afca2907f41a1c597dedcb5cebf4ddf3ad4d72357f0afe82dbae13472006a7a63dd9e9127f23f94a275af6f3f033e647bdac61f786824b156dcc503b2f
SSDEEP
3072:kozFmnMdu3BrojYxrdrwvOpnjnpzw4opHp8:FZmtBUErdw4njnpM4oVp8
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
da8273d8e58286c10b04a0c6fc5ba1ae_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MapViewOfFile
CreateFileMappingA
HeapAlloc
UnmapViewOfFile
GetCurrentProcess
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
GetProcessHeap
WaitForMultipleObjects
GetPrivateProfileStringA
ReleaseMutex
CreateMutexA
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
DisableThreadLibraryCalls
FreeConsole
FreeLibrary
GetVersion
MoveFileExA
CopyFileA
lstrcmpiA
GetCurrentThreadId
HeapFree
GetLocalTime
OpenProcess
ExitProcess
Process32Next
GlobalMemoryStatus
GetVersionExA
WritePrivateProfileStringA
RemoveDirectoryA
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
DeleteFileA
LoadLibraryA
GetProcAddress
WriteFile
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
FindFirstFileA
SetFilePointer
ReadFile
LocalFree
CreateFileA
GetFileSize
Sleep
CancelIo
InterlockedExchange
ResetEvent
LocalAlloc
LocalSize
LocalReAlloc
InterlockedDecrement
WideCharToMultiByte
InterlockedIncrement
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
GetTempPathA
GetTickCount
GetSystemDirectoryA
SetLastError
OutputDebugStringA
GetModuleFileNameA
CreateToolhelp32Snapshot
MoveFileA
Process32First
CloseHandle
PeekNamedPipe
CreateEventA
UnhookWindowsHookEx
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
GetActiveWindow
CloseClipboard
SetClipboardData
SetWindowsHookExA
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowTextA
GetThreadDesktop
OpenDesktopA
CallNextHookEx
EmptyClipboard
GetKeyNameTextA
GetClientRect
DispatchMessageA
TranslateMessage
GetMessageA
CreateWindowExA
CharNextA
mouse_event
wsprintfA
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
ShowWindow
PostMessageA
EnumWindows
GetWindowThreadProcessId
IsWindowVisible
ExitWindowsEx
FindWindowA
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
RegCreateKeyA
RegQueryValueA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegQueryInfoKeyA
RegSetValueExA
CloseServiceHandle
EnumServicesStatusA
OpenSCManagerA
QueryServiceConfigA
OpenServiceA
DeleteService
ControlService
QueryServiceStatus
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
SHGetFileInfoA
ShellExecuteA
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
SysFreeString
_strrev
isdigit
_strnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
calloc
_beginthreadex
rename
_strlwr
strtoul
strncmp
sprintf
atoi
realloc
strchr
strncat
strncpy
strrchr
_except_handler3
malloc
free
_CxxThrowException
wcstombs
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
waveOutClose
waveInReset
waveInStop
waveInClose
waveOutReset
waveOutUnprepareHeader
waveInUnprepareHeader
waveInStart
waveOutWrite
waveOutPrepareHeader
waveInAddBuffer
waveOutGetNumDevs
waveOutOpen
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
WSAStartup
WSACleanup
WSAIoctl
closesocket
send
gethostname
getsockname
setsockopt
connect
htons
gethostbyname
socket
select
recv
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
GetModuleFileNameExA
EnumProcessModules
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
WTSQueryUserToken
CreateEnvironmentBlock
InternetReadFile
ICOpen
ICSeqCompressFrame
ICCompressorFree
ICSeqCompressFrameEnd
ICSendMessage
ICClose
ICGetInfo
ICInfo
ICSeqCompressFrameStart
DeleteInstallFile
FirstRun
ServiceMain
UninstallServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ