AAA
MainService
Service
ServiceInstall
ServiceReplace
ServiceUninstall
Behavioral task
behavioral1
Sample
eb5f83123e54434274d819b26c800fcb_JaffaCakes118.dll
Resource
win7-20240708-en
Target
eb5f83123e54434274d819b26c800fcb_JaffaCakes118
Size
110KB
MD5
eb5f83123e54434274d819b26c800fcb
SHA1
a79a946e5f19b69ec7e9d8482d2c2326394cf6ea
SHA256
e4b89a21eacefb083aafdbbb1fe12b40df3dad5887431a671cf4028f0020cc31
SHA512
cda6802598fa69f4e33c5ba8e3b2b3e565f006e07383a0fb23cb0a1d5278456c4e1860a5b874b50315790daa7a6d7488806f2bae5689b376ab8c57bc9b648877
SSDEEP
3072:G/DrlYvroBjrRU62sNeI1j6R97MaVM3slb:QDrldjv2sY+O9wwM36b
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
eb5f83123e54434274d819b26c800fcb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
GetProcAddress
LoadLibraryA
VirtualAlloc
InterlockedExchange
CancelIo
GetLastError
CreateDirectoryA
lstrlenA
CreateProcessA
lstrcatA
GetDiskFreeSpaceExA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
MoveFileA
WinExec
GetWindowsDirectoryA
SetLastError
WriteFile
CreateFileA
GetVersionExA
GetCurrentProcess
FreeLibrary
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
MoveFileExA
HeapFree
GetProcessHeap
MapViewOfFile
CreateFileMappingA
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
DeleteFileA
Sleep
RaiseException
strncpy
atoi
strtok
strncat
strchr
realloc
wcstombs
strrchr
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_except_handler3
malloc
free
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
_beginthreadex
??3@YAXPAX@Z
_strnicmp
_stricmp
??2@YAPAXI@Z
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
ICOpen
AAA
MainService
Service
ServiceInstall
ServiceReplace
ServiceUninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ