Install
MyNewFun
wintest
Behavioral task
behavioral1
Sample
JaffaCakes118_536f5ff83566ae4fe652853c041a9c50.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_536f5ff83566ae4fe652853c041a9c50.dll
Resource
win10v2004-20250217-en
Target
JaffaCakes118_536f5ff83566ae4fe652853c041a9c50
Size
117KB
MD5
536f5ff83566ae4fe652853c041a9c50
SHA1
a026cfb39f3253948f6bfe543e8a237a3cd75801
SHA256
248944b10feb9919c98e212385b777458265fa92cbf60a7e553791f3c076c778
SHA512
5d3c59c4f8564e47d61236900d2bb25362730e1ab6cd887f781718b44bcd9465996314ef68edfb5d21f9fe05e02cad95a7d9cbfef8dc0de6797305642c5ce388
SSDEEP
1536:xNY14eZoAb++Eb8B9+WO9DceTyfDvqqSQz/EvgiVf/LcgyY6:M14eZZCZ8B9NO9DJTEDvq0/EI4f/og6
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_536f5ff83566ae4fe652853c041a9c50 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
OutputDebugStringA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
GlobalFree
CreateRemoteThread
GlobalMemoryStatus
DuplicateHandle
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
FreeConsole
CreateToolhelp32Snapshot
GetCurrentThreadId
RaiseException
LocalSize
UnmapViewOfFile
WaitForMultipleObjects
HeapAlloc
GetCurrentProcess
Process32First
Process32Next
GetSystemDirectoryA
lstrcmpiA
SetLastError
GetModuleFileNameA
MoveFileA
CreateFileMappingA
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
lstrcpyA
Sleep
CancelIo
InterlockedExchange
ResetEvent
VirtualAlloc
MapViewOfFile
GetProcessHeap
HeapFree
GetTickCount
GetLocalTime
MoveFileExA
OpenProcess
VirtualAllocEx
WriteFile
WriteProcessMemory
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
CreateEventA
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
DeviceIoControl
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
GetActiveWindow
EmptyClipboard
LoadCursorA
GetClipboardData
GetSystemMetrics
SetRect
ReleaseDC
GetCursorInfo
GetCursorPos
GetDC
SetProcessWindowStation
IsWindow
CloseWindow
CreateWindowExA
DispatchMessageA
UnhookWindowsHookEx
SetWindowsHookExA
EnumWindows
GetWindowTextA
CallNextHookEx
OpenClipboard
GetKeyNameTextA
MessageBoxA
SetClipboardData
ExitWindowsEx
TranslateMessage
GetMessageA
wsprintfA
CharNextA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
GetProcessWindowStation
OpenWindowStationA
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateDCA
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
LsaOpenPolicy
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CreateServiceA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
QueryServiceConfigA
EnumServicesStatusA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupAccountSidA
GetTokenInformation
QueryServiceStatus
SHGetSpecialFolderPathA
SHGetFileInfoA
_strnicmp
_strrev
_onexit
_strupr
_adjust_fdiv
_initterm
_strcmpi
__dllonexit
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
strncat
strtok
atoi
time
localtime
sprintf
strncpy
strrchr
_except_handler3
free
malloc
strchr
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
waveOutPrepareHeader
waveInReset
waveInClose
waveOutReset
waveOutUnprepareHeader
waveOutClose
waveInStop
waveOutGetNumDevs
waveOutOpen
waveOutWrite
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInUnprepareHeader
waveInGetNumDevs
getsockname
send
closesocket
recv
select
WSAStartup
WSACleanup
setsockopt
connect
htons
gethostname
gethostbyname
socket
WSAIoctl
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
ICSeqCompressFrame
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationA
CreateEnvironmentBlock
GetModuleFileNameExA
Install
MyNewFun
wintest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE