GETGETGET
HHHHHHHHHHH
KKKKKKKKKK
OIC
QQQWWWWQWEEE
ServiceMain
WWWWWEEERRRRRRR
YYYYYYYYYYY
Behavioral task
behavioral1
Sample
JaffaCakes118_4a16144d333667f248439849119c9328.dll
Resource
win7-20240903-en
Target
JaffaCakes118_4a16144d333667f248439849119c9328
Size
86KB
MD5
4a16144d333667f248439849119c9328
SHA1
c3221b0be8385407bb926cd74696b8e155abaabb
SHA256
1806f0575a3d11f02684fb541ed3d5228259e3287b35d8029ca2a10b7e8461a1
SHA512
04a51187312917b9fc48341c4cda9ebbab208db0b7e000dbc34402165b0337b5fdd5fbae335de700363488f39a992371fbfedae6121fe660bf99a9413647436e
SSDEEP
1536:1ua4FQX0XACl+YHMh4kAY9mMdacgsyAfuLcMsPamuJuGHy9HE:1ua4FQX0XuYHe4WmMdarsyauLcNPamu9
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_4a16144d333667f248439849119c9328 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalLock
GlobalAlloc
GlobalSize
DeviceIoControl
GlobalMemoryStatus
GetVersionExA
OpenEventA
SetErrorMode
GlobalUnlock
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
FreeConsole
GetCurrentThreadId
RaiseException
GlobalFree
LocalAlloc
HeapAlloc
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetProcessHeap
HeapFree
GetFileSize
WriteFile
GetTickCount
GetLocalTime
MoveFileA
MoveFileExA
CreateEventA
TerminateThread
CreateThread
OpenProcess
FreeLibrary
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
GetCurrentDirectoryA
lstrcatA
GetFileAttributesA
LocalFree
SetLastError
GetLastError
GetModuleFileNameA
CreateFileA
SetFilePointer
ReadFile
lstrlenA
DeleteFileA
Sleep
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
LoadLibraryA
GetProcAddress
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
VirtualFree
DeleteCriticalSection
SetUnhandledExceptionFilter
SetWindowsHookExA
UnhookWindowsHookEx
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
PostMessageA
OpenDesktopA
wsprintfA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
CallNextHookEx
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
SelectObject
ControlService
DeleteService
CloseServiceHandle
RegisterServiceCtrlHandlerA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
SHGetFolderPathA
SHDeleteKeyA
free
_strnicmp
_strrev
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
realloc
strncat
_errno
strchr
strcpy
malloc
_strcmpi
strcat
strcmp
strlen
strncmp
memcpy
atoi
memset
strncpy
_except_handler3
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
ceil
memmove
??3@YAXPAX@Z
inet_ntoa
inet_addr
getsockname
bind
getpeername
accept
listen
send
recvfrom
__WSAFDIsSet
gethostname
socket
gethostbyname
htons
connect
select
closesocket
recv
sendto
ntohs
WSAStartup
WSACleanup
setsockopt
WSAIoctl
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
GETGETGET
HHHHHHHHHHH
KKKKKKKKKK
OIC
QQQWWWWQWEEE
ServiceMain
WWWWWEEERRRRRRR
YYYYYYYYYYY
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ