CodeDLL
Fuck360
PassWordA
PassWordB
ServerDll
UsernameA
main
Behavioral task
behavioral1
Sample
eebf5ed88209a8c435570cb02d76da38_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eebf5ed88209a8c435570cb02d76da38_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
eebf5ed88209a8c435570cb02d76da38_JaffaCakes118
Size
11.3MB
MD5
eebf5ed88209a8c435570cb02d76da38
SHA1
ec66de9396c153711eea0931d489a547166fdb45
SHA256
23fbb804ec8637c0503b565a4f97418b9d4ccb780fa61e8c2bb15b7810bd7de8
SHA512
5a3d5d11279896fc9bc101576eb3f2cd0e10fed962a7ca9e95be743e93424c5a096d603cd219eff5cef20587c93950812dadeabd29c8942ca068cca5f4e1b43c
SSDEEP
6144:ldbHh7PAkOoB8AGaz87uURxdbHh7PAkOoB8AGaz87uURw:LhbA6BfW6UthbA6BfW6Uu
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
eebf5ed88209a8c435570cb02d76da38_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetEvent
GetProcAddress
LoadLibraryA
ResumeThread
CreateThread
CreateEventA
CloseHandle
DeleteCriticalSection
lstrcpyA
ResetEvent
GetPrivateProfileSectionNamesA
FreeLibrary
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
CreateProcessA
GetDriveTypeA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
WriteFile
MoveFileA
SetLastError
GetFileAttributesA
lstrcatA
WinExec
GetCurrentProcess
OpenProcess
WaitForSingleObject
Sleep
InitializeCriticalSection
ExitProcess
GetTickCount
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
LocalAlloc
SetFilePointer
GetLocalTime
GlobalFree
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalSize
InterlockedExchange
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
PeekNamedPipe
WaitForMultipleObjects
OutputDebugStringA
GlobalMemoryStatus
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
GetModuleFileNameA
FreeConsole
LocalSize
GetCurrentThreadId
RaiseException
strncpy
atoi
strncmp
_errno
wcscpy
strncat
realloc
strrchr
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
??3@YAXPAX@Z
_except_handler3
free
malloc
strchr
_CxxThrowException
memmove
strstr
_ftol
ceil
__CxxFrameHandler
wcstombs
_strupr
_strnicmp
_strrev
_strnset
??2@YAPAXI@Z
_strcmpi
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
NetLocalGroupAddMembers
NetUserAdd
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
ICSeqCompressFrame
ICSendMessage
CodeDLL
Fuck360
PassWordA
PassWordB
ServerDll
UsernameA
main
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ