tashanao
wangluo
woshibaba
zheshi
Behavioral task
behavioral1
Sample
JaffaCakes118_4c6d8c71863b88a3c56a3dd16292936b.dll
Resource
win7-20240903-en
Target
JaffaCakes118_4c6d8c71863b88a3c56a3dd16292936b
Size
5.0MB
MD5
4c6d8c71863b88a3c56a3dd16292936b
SHA1
748bc562fc432bc01631eca6e6fd15a3ab235785
SHA256
2c9d6575e26a1a7c3c197d0e0ad67f95d2061cbf7d6ecea57a73e48c37173b07
SHA512
5f1d83385f3d8394369a84fb73f95afc64f87c30a92a67c1e98d0e8d0f999c68e31eeab8d7ee420eb2cbb1b36aaceb6226f97d685f0c3deb588225cf900411db
SSDEEP
3072:HzK5S9ERdbsJd84Qc/whoGmip8ntWkgwFBlSudg222222222222222222222222E:KsJeb1m2kwkgw3oKR
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_4c6d8c71863b88a3c56a3dd16292936b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
FreeLibrary
CloseHandle
TerminateThread
Sleep
SetEvent
ResumeThread
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
GetLastError
ResetEvent
InterlockedExchange
CancelIo
GetTickCount
GetLocalTime
GetCurrentProcessId
HeapAlloc
GetProcessHeap
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
lstrcpyA
GetWindowsDirectoryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
CreateProcessA
WinExec
WriteFile
CreateFileA
CreateThread
InitializeCriticalSection
Process32Next
lstrcmpiA
HeapFree
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
LocalSize
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
TerminateProcess
OpenProcess
GlobalMemoryStatus
WaitForSingleObject
OpenEventA
SetErrorMode
GetCurrentProcess
SetFileAttributesA
CopyFileA
CreateEventA
ExpandEnvironmentStringsA
GetModuleFileNameA
RaiseException
strncpy
strchr
malloc
free
_except_handler3
strrchr
atoi
strncmp
_errno
wcscpy
sprintf
wcstombs
_access
srand
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
rand
_CxxThrowException
strstr
_ftol
ceil
putchar
memmove
__CxxFrameHandler
puts
_beginthreadex
??3@YAXPAX@Z
??2@YAPAXI@Z
_strnicmp
_strcmpi
_strrev
_stricmp
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
tashanao
wangluo
woshibaba
zheshi
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.