MutiHack
Startup
Behavioral task
behavioral1
Sample
JaffaCakes118_5210c3dd5b0204dc4cb34453f6a46fc8.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5210c3dd5b0204dc4cb34453f6a46fc8.dll
Resource
win10v2004-20250217-en
Target
JaffaCakes118_5210c3dd5b0204dc4cb34453f6a46fc8
Size
80KB
MD5
5210c3dd5b0204dc4cb34453f6a46fc8
SHA1
31f7f1d5ad2a18489ed0c75cbca43cdce0a0985a
SHA256
2a213026f1739276f948a9fdf6ada666a6d2d41a075cfbb109fe7b022f149f67
SHA512
f8e57137e3de6555812c63b296b210455427ff829db21d7a42ee49a2acce3727b874ad173c2f290af9800d337ba79bc3a868bec24f1245516b29186ca9187685
SSDEEP
1536:gRt8zpIm5Ojz+6C2Rcu+1fafcGr1V6XDpQ4/ZCx5v:gRwIZpnRp+tafciT6lQ4/ZCx5v
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_5210c3dd5b0204dc4cb34453f6a46fc8 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcessHeap
MapViewOfFile
CreateFileMappingA
HeapAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
QueryPerformanceCounter
QueryPerformanceFrequency
SetThreadPriority
SetPriorityClass
GetCurrentProcess
GetCurrentThread
GetPriorityClass
GetLogicalDrives
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExA
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
InitializeCriticalSection
HeapFree
GetSystemDirectoryA
GetTickCount
SetLastError
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
Sleep
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
MoveFileExA
TerminateThread
OpenProcess
LoadLibraryA
GetProcAddress
FreeLibrary
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetThreadPriority
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
GetWindowTextA
IsWindowVisible
GetWindowThreadProcessId
CloseWindow
IsWindow
OpenDesktopA
SetProcessWindowStation
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
CharNextA
OpenWindowStationA
CreateWindowExA
GetProcessWindowStation
ExitWindowsEx
wsprintfA
PostMessageA
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
SetClipboardData
CloseClipboard
DeleteDC
GetDIBits
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
DeleteObject
BitBlt
DuplicateTokenEx
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegisterServiceCtrlHandlerA
SetServiceStatus
CreateProcessAsUserA
SetTokenInformation
RegCloseKey
SHGetFileInfoA
SHDeleteKeyA
strrchr
strncpy
strncat
strchr
realloc
_CxxThrowException
atoi
atol
_except_handler3
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
malloc
free
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
_strcmpi
ceil
memmove
wcstombs
??3@YAXPAX@Z
_strnicmp
WTSQueryUserToken
recv
select
closesocket
gethostbyname
send
gethostname
getsockname
socket
htons
connect
setsockopt
WSACleanup
WSAStartup
WSAIoctl
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
capGetDriverDescriptionA
capCreateCaptureWindowA
ICSeqCompressFrame
EnumProcessModules
GetModuleFileNameExA
MutiHack
Startup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ