StartServiceEx
StopServiceEx
_ServiceRouteEx@12
Static task
static1
Behavioral task
behavioral1
Sample
Backdoor.Win32.Agent.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Backdoor.Win32.Agent.dll
Resource
win10v2004-20240802-en
Target
07852ad0578588a7ad7845e101ef1b33_JaffaCakes118
Size
6KB
MD5
07852ad0578588a7ad7845e101ef1b33
SHA1
7c7b8ff6db60fbd0ca1047e9b5c9b3d2bfed0768
SHA256
d33b029054644cdb819c05205938b04dfce6821f1788fd76aa322790a18c4293
SHA512
fd96f5aaa82c296d54da16c60f1c781c16af763889f858ce7363bd3bb3a279143d0b366bcc6733979e86de7a5946116bb45fdfd3a12c4ad492e020a0c522d5b2
SSDEEP
192:KerRLbOCHz3JIMNTSaI2C/xBEYSPcXg/+g8W0EWR:FtLbOCHTJIMN+Z2sBEY4cXg/+g8W0ES
Checks for missing Authenticode signature.
resource |
---|
unpack001/Backdoor.Win32.Agent.rsr |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
lstrcatA
CloseHandle
GetCurrentDirectoryA
GetModuleFileNameA
CreateThread
VirtualProtect
lstrlenA
Sleep
ExitProcess
GetMessageA
PostQuitMessage
DestroyWindow
DispatchMessageA
TranslateMessage
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
wsprintfA
GetKeyboardState
MapVirtualKeyA
ToAscii
SetTimer
KillTimer
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
DefWindowProcA
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
gethostname
time
srand
rand
memcpy
strcmp
free
fopen
fclose
fwrite
memset
strcpy
strrchr
memcmp
_initterm
malloc
_adjust_fdiv
strcat
strlen
exit
_strlwr
_itoa
StartServiceEx
StopServiceEx
_ServiceRouteEx@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ