AntiKaba
HOOK
ServiceMain
Behavioral task
behavioral1
Sample
dd98e04140ae15d3bcfc78f0cd7f3fce_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd98e04140ae15d3bcfc78f0cd7f3fce_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
dd98e04140ae15d3bcfc78f0cd7f3fce_JaffaCakes118
Size
89KB
MD5
dd98e04140ae15d3bcfc78f0cd7f3fce
SHA1
1e34b3d0c7229c7be989f2d131ab97b5002fdbbd
SHA256
5aed8303040a412a2ac04e3d3ac7d08a3c6c2a274f858ca165334537392594ed
SHA512
4b31f189e09477438dd01384d71d8705fd3895e31a80484679c3b38a8e7bfd0d64df4307571b80bba140d99b3914f6fca808e13884baea5dff6fed423791a953
SSDEEP
1536:SnsgLhi46cN0gnKumavurtCc6s5fhfuRK3UWVO3lJlvz//zwRb:0P56iK5rtChs5hfuSUSO3lJlvz/L0b
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
dd98e04140ae15d3bcfc78f0cd7f3fce_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalAlloc
CreateDirectoryA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
FindNextFileA
LocalReAlloc
FindFirstFileA
RemoveDirectoryA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
UnmapViewOfFile
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
ResetEvent
CancelIo
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
HeapAlloc
CreateFileMappingA
GetProcessHeap
MapViewOfFile
HeapFree
GetLocalTime
GetFileSize
WriteFile
MoveFileA
MoveFileExA
OpenProcess
LoadLibraryA
GetProcAddress
FreeLibrary
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
CreateProcessA
GetSystemDirectoryA
lstrcatA
GetFileAttributesA
LocalFree
SetLastError
GetLastError
GetModuleFileNameA
CreateFileA
SetFilePointer
ReadFile
DeleteFileA
FreeConsole
OutputDebugStringA
SetUnhandledExceptionFilter
lstrcpyA
CreateMutexA
SetErrorMode
OpenEventA
ReleaseMutex
GetVersionExA
lstrlenA
GetTickCount
Sleep
InterlockedExchange
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateEventA
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
GlobalSize
DestroyCursor
BlockInput
SystemParametersInfoA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
UnhookWindowsHookEx
LoadCursorA
GetCursorInfo
GetCursorPos
SetWindowsHookExA
CallNextHookEx
GetKeyNameTextA
DispatchMessageA
TranslateMessage
GetMessageA
CreateWindowExA
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetActiveWindow
ReleaseDC
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
PostMessageA
CharNextA
IsWindow
SendMessageA
wsprintfA
MessageBoxA
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetDesktopWindow
GetWindowTextA
CloseWindow
GetDIBits
BitBlt
DeleteDC
SelectObject
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
DeleteObject
RegOpenKeyExA
RegEnumKeyExA
RegEnumValueA
RegCreateKeyExA
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegisterServiceCtrlHandlerA
SetServiceStatus
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegDeleteValueA
SHGetFileInfoA
SHDeleteKeyA
_strcmpi
_itoa
_strnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
free
strrchr
_CxxThrowException
_except_handler3
strncpy
wcstombs
strchr
atoi
malloc
realloc
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutWrite
waveInStop
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInUnprepareHeader
waveInReset
waveOutClose
Netbios
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
capGetDriverDescriptionA
capCreateCaptureWindowA
ICSeqCompressFrameEnd
ICClose
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
ICCompressorFree
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
ntohs
recv
select
send
gethostname
WSAStartup
WSACleanup
closesocket
getsockname
GetModuleFileNameExA
EnumProcessModules
AntiKaba
HOOK
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ