Install
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
MyNewFun
ftsWordBreak
wintest
Behavioral task
behavioral1
Sample
dc485078f3282f908b39f6d13dee64a7_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc485078f3282f908b39f6d13dee64a7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
dc485078f3282f908b39f6d13dee64a7_JaffaCakes118
Size
127KB
MD5
dc485078f3282f908b39f6d13dee64a7
SHA1
546948f6ac165bcaedce7cc5c119f17e6c7ddd29
SHA256
8ca0db89e95467ff47464396a8ec396bcde5861d530fb3266d60268246912d0e
SHA512
63b94b6163c764b5bd9a4ed93564e51fb8dbef5f5fdfbab010b23d6e6f88ce8c12979c51db3eb49100e817fa9759b9cac54e9508db8f72bdd27012870a569384
SSDEEP
3072:b80Qbu2X59FMsEYeGb8raHrKQ66GmuuC:o1i2fFGwbiKKQ66Gmu
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
dc485078f3282f908b39f6d13dee64a7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
OutputDebugStringA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
DeviceIoControl
GlobalMemoryStatus
GlobalFree
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
ExitProcess
DisableThreadLibraryCalls
FreeConsole
SetFileAttributesA
CopyFileA
CreateMutexA
CreateToolhelp32Snapshot
GetCurrentThreadId
RaiseException
LocalSize
UnmapViewOfFile
CreateRemoteThread
HeapAlloc
GetCurrentProcess
Process32First
Process32Next
GetSystemDirectoryA
lstrcmpiA
CreateFileMappingA
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
lstrcatA
lstrlenA
lstrcpyA
Sleep
CancelIo
InterlockedExchange
ResetEvent
VirtualAlloc
MapViewOfFile
GetProcessHeap
HeapFree
GetTickCount
GetLocalTime
MoveFileExA
OpenProcess
VirtualAllocEx
SetLastError
WriteProcessMemory
EnterCriticalSection
LeaveCriticalSection
CreateEventA
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
UnhookWindowsHookEx
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
SetWindowsHookExA
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
ReleaseDC
GetCursorInfo
GetCursorPos
GetDC
SetProcessWindowStation
IsWindow
CloseWindow
CreateWindowExA
DispatchMessageA
CallNextHookEx
GetKeyNameTextA
GetActiveWindow
EnumWindows
GetWindowTextA
ExitWindowsEx
MessageBoxA
CloseClipboard
TranslateMessage
GetMessageA
wsprintfA
CharNextA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
GetProcessWindowStation
OpenWindowStationA
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateDCA
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
RegCreateKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
QueryServiceStatus
OpenServiceA
DeleteService
ControlService
StartServiceA
QueryServiceConfigA
EnumServicesStatusA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
RegisterServiceCtrlHandlerA
SetServiceStatus
SHGetFileInfoA
_strnicmp
_strrev
??1type_info@@UAE@XZ
_strupr
_adjust_fdiv
_initterm
_onexit
__dllonexit
_strcmpi
calloc
_beginthreadex
_mbschr
_stricmp
wcstombs
strncat
strtok
atoi
time
localtime
sprintf
strncpy
strrchr
_except_handler3
free
malloc
strchr
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
waveOutReset
waveOutUnprepareHeader
waveOutClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveInGetNumDevs
waveInStart
waveInAddBuffer
waveInClose
waveInPrepareHeader
waveInOpen
getsockname
closesocket
recv
WSAStartup
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
send
gethostname
select
WSACleanup
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
ICSeqCompressFrame
ICSeqCompressFrameEnd
ICCompressorFree
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
WTSQueryUserToken
CreateEnvironmentBlock
Install
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
MyNewFun
ftsWordBreak
wintest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ