AntiKaba
HOOK
ServiceMain
vvvvvvvv
Behavioral task
behavioral1
Sample
ebc840570055d035f4451ae777f56ee3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebc840570055d035f4451ae777f56ee3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ebc840570055d035f4451ae777f56ee3_JaffaCakes118
Size
74KB
MD5
ebc840570055d035f4451ae777f56ee3
SHA1
b5f123e97bbe8556070feebb3c309bfa218f2452
SHA256
2a647cc2fba37cedb6d3adcd69e7a21bde59b1ea4d76afcf5babb9d858dc9a2f
SHA512
ba7c5ae14adfd88586e1502992e2d2828d0c111430be3bd8b9dd93d26be256dd235f5dbebe48c83bc8cadafb8142c989286241cb5722c6640d32997f8cc989fa
SSDEEP
1536:onnt7n9IvYh2FKLKfIcSROfroMtu9hPF8TaD/LqSrc:onxnOTKOfINRIroMM9hPFYaD/eEc
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
ebc840570055d035f4451ae777f56ee3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteProcessMemory
VirtualAllocEx
FreeLibrary
GetProcAddress
LoadLibraryA
OpenProcess
TerminateThread
MoveFileExA
GetTickCount
GetSystemDirectoryA
HeapFree
GetProcessHeap
MapViewOfFile
CreateFileMappingA
HeapAlloc
GetVersionExA
CreateRemoteThread
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetWindowsDirectoryA
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
CreateThread
FreeConsole
GetCurrentThreadId
GetCurrentProcess
SetLastError
GetLastError
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
lstrlenA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
OutputDebugStringA
CreateProcessA
DeleteFileA
InitializeCriticalSection
Sleep
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
Process32Next
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
ExitWindowsEx
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
MessageBoxA
wsprintfA
GetLengthSid
SetSecurityDescriptorDacl
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
InitializeSecurityDescriptor
CreateServiceA
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
AllocateAndInitializeSid
SHGetFileInfoA
SHDeleteKeyA
_itoa
_strnicmp
_strcmpi
_adjust_fdiv
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
??2@YAPAXI@Z
_CxxThrowException
strrchr
_except_handler3
strncpy
malloc
realloc
atoi
strchr
strtok
wcstombs
strncat
_beginthreadex
calloc
free
??1type_info@@UAE@XZ
_initterm
ntohs
socket
gethostbyname
recv
connect
setsockopt
WSAIoctl
closesocket
select
send
getsockname
htons
WSAStartup
WSACleanup
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
Netbios
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
AntiKaba
HOOK
ServiceMain
vvvvvvvv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ