Beat3
DllInstall
abcd
bnhj
ff
ff111
ioioio
okl
sfhfghfgh
Behavioral task
behavioral1
Sample
0e3f056a788eda589a67cd8c54c11949_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e3f056a788eda589a67cd8c54c11949_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
0e3f056a788eda589a67cd8c54c11949_JaffaCakes118
Size
2.8MB
MD5
0e3f056a788eda589a67cd8c54c11949
SHA1
5892e53f039e586bac1f2522953f3ab2a9977abd
SHA256
955fabe64eff07f85efb6516970c2764df4644afdb1d8f77481694539573597a
SHA512
aab2dcf5f81d6f0ab64483b683ae3934599accf163affbe8a5e23ceb0293d39a48bdc13ab36670fef80508857e7d5fe8e1378a1650988b851f737cd29ee0de7b
SSDEEP
49152:kDxRcxR2xRPxRgxRwxRVxRmxRBxRAxRJxRlxRmxRhxRxxRDxRcxRoxRaxR9xR:0w+7EUNupkBduJZ/wcSl
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
0e3f056a788eda589a67cd8c54c11949_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
GetCurrentProcess
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
SetEvent
InterlockedExchange
CancelIo
Sleep
FreeLibrary
GetCurrentThreadId
GetProcAddress
LoadLibraryA
lstrcpyA
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
lstrcatA
GetVolumeInformationA
FindClose
LocalFree
FindNextFileA
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetModuleFileNameA
SetLastError
VirtualAllocEx
OpenProcess
TerminateThread
MoveFileExA
GetTickCount
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
WideCharToMultiByte
ReadProcessMemory
GetStartupInfoA
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetVersionExA
VirtualQuery
LoadResource
FindResourceA
OpenEventA
CreateThread
SetErrorMode
SetUnhandledExceptionFilter
FreeConsole
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
RaiseException
_except_handler3
strrchr
wcsrchr
_CxxThrowException
strncpy
strncat
strchr
wcslen
atoi
realloc
tolower
malloc
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_stricmp
_strnicmp
_strcmpi
??3@YAXPAX@Z
free
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
ceil
wcstombs
memmove
send
closesocket
select
socket
gethostbyname
htons
connect
getsockname
recv
gethostname
setsockopt
WSACleanup
WSAStartup
WSAIoctl
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
GetModuleFileNameExA
EnumProcessModules
Beat3
DllInstall
abcd
bnhj
ff
ff111
ioioio
okl
sfhfghfgh
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ