AntiKaba
HOOK
ServiceMain
Behavioral task
behavioral1
Sample
JaffaCakes118_4fe96af98b476226d43e4b82a290d4f0.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4fe96af98b476226d43e4b82a290d4f0.dll
Resource
win10v2004-20250217-en
Target
JaffaCakes118_4fe96af98b476226d43e4b82a290d4f0
Size
66KB
MD5
4fe96af98b476226d43e4b82a290d4f0
SHA1
960678d02f2eced31b7ecab14c31176eb26d3811
SHA256
6c6a3da3801ea27ef09011c430b1b5277d0ca76f032c76e3a3a8939f6c645a57
SHA512
224ffd7737dbcf6570329ea21c836abe322730fe9e5a70958c6349eab5a23a166aca5fc89e02a335d4e2ce96c7989d0d151eb7d27839d4a17ee45404d1954ea7
SSDEEP
1536:B0GcsKvzlzMoQBcuw5fLhOSkrsKPSvGVj/Ov:B0GrKvl5QBdw5LhOVrsKPSvGVj/Ov
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_4fe96af98b476226d43e4b82a290d4f0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteProcessMemory
VirtualAllocEx
FreeLibrary
GetProcAddress
LoadLibraryA
OpenProcess
TerminateThread
MoveFileExA
GetTickCount
GetSystemDirectoryA
HeapFree
GetProcessHeap
MapViewOfFile
CreateFileMappingA
CreateRemoteThread
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
GetCurrentThreadId
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
GetCurrentProcess
SetLastError
GetLastError
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
lstrlenA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
OutputDebugStringA
CreateProcessA
DeleteFileA
Sleep
CancelIo
InitializeCriticalSection
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
HeapAlloc
OpenWindowStationA
SetProcessWindowStation
GetProcessWindowStation
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
ExitWindowsEx
wsprintfA
OpenDesktopA
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegisterServiceCtrlHandlerA
SetServiceStatus
GetLengthSid
SHGetFileInfoA
SHDeleteKeyA
_strcmpi
_strnicmp
_itoa
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
??2@YAPAXI@Z
_CxxThrowException
strrchr
_except_handler3
strncpy
malloc
strncat
strchr
_beginthreadex
realloc
atoi
wcstombs
calloc
free
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
ntohs
socket
gethostbyname
htons
recv
WSAStartup
WSACleanup
setsockopt
WSAIoctl
closesocket
select
send
getsockname
connect
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
Netbios
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
AntiKaba
HOOK
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ