AntiKaba
HOOK
ServiceMain
TSEGetModule
vvvvvvvv
Behavioral task
behavioral1
Sample
JaffaCakes118_5e42abf9feddb7408f56bf6950012660.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5e42abf9feddb7408f56bf6950012660.dll
Resource
win10v2004-20250217-en
Target
JaffaCakes118_5e42abf9feddb7408f56bf6950012660
Size
99KB
MD5
5e42abf9feddb7408f56bf6950012660
SHA1
b39fe0107eedc8afdf2b52069399d34bfe907d19
SHA256
6c2baaa10daa8d5eb59829e6008ecaa830c80a58dafe6577f2f08e92dced0d01
SHA512
d00544a64e6d9c238aebd4e181abc3c543ad0f86344f7ce0e51f45e4f78620b3b2e16808e04fb36f87d026e9ee47f731b651b24434cad1bb2d1e6e943412d8c4
SSDEEP
3072:qXuQivoN/1svGe/B/mlhw86TMaqWWT3gj/LW0U:bQkoVCzlMaBTMaqWWTwHI
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_5e42abf9feddb7408f56bf6950012660 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OutputDebugStringA
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
ExitProcess
FreeConsole
CreateDirectoryA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
FindNextFileA
LocalReAlloc
FindFirstFileA
CreateToolhelp32Snapshot
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
ResetEvent
CancelIo
LocalSize
GetCurrentThreadId
Process32First
lstrcmpiA
Process32Next
GetModuleHandleA
GlobalFree
GetWindowsDirectoryA
GetVersionExA
LocalAlloc
UnmapViewOfFile
HeapAlloc
CreateFileMappingA
MapViewOfFile
GetProcessHeap
HeapFree
GetLocalTime
GetFileSize
WriteFile
MoveFileA
MoveFileExA
OpenProcess
LoadLibraryA
GetProcAddress
FreeLibrary
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
lstrcpyA
CreateProcessA
GetSystemDirectoryA
lstrcatA
GetFileAttributesA
LocalFree
SetLastError
GetLastError
GetModuleFileNameA
CreateFileA
SetFilePointer
ReadFile
lstrlenA
DeleteFileA
GetTickCount
Sleep
InterlockedExchange
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
CreateEventA
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
RemoveDirectoryA
DestroyCursor
BlockInput
SystemParametersInfoA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
LoadCursorA
CloseClipboard
SetClipboardData
GetProcessWindowStation
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
mouse_event
ReleaseDC
GetCursorInfo
GetCursorPos
UnhookWindowsHookEx
OpenWindowStationA
SetProcessWindowStation
CharNextA
DispatchMessageA
MessageBoxA
EmptyClipboard
wsprintfA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
CallNextHookEx
TranslateMessage
GetMessageA
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
PostMessageA
IsWindow
SendMessageA
CloseWindow
CreateWindowExA
GetDesktopWindow
SetWindowsHookExA
CreateCompatibleBitmap
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
GetDIBits
BitBlt
OpenEventLogA
RegEnumKeyExA
RegEnumValueA
RegCreateKeyExA
RegDeleteKeyA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
CreateServiceA
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegDeleteValueA
SHGetFileInfoA
SHDeleteKeyA
_strcmpi
_strnicmp
_itoa
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
free
wcstombs
strchr
atoi
realloc
malloc
strrchr
_CxxThrowException
strncpy
_except_handler3
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutWrite
waveInStop
waveInReset
waveInUnprepareHeader
waveInClose
waveOutUnprepareHeader
waveOutReset
waveOutClose
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
Netbios
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
capGetDriverDescriptionA
capCreateCaptureWindowA
ICOpen
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
EnumProcessModules
GetModuleFileNameExA
WSAStartup
gethostname
getsockname
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
ntohs
recv
select
send
WSACleanup
closesocket
AntiKaba
HOOK
ServiceMain
TSEGetModule
vvvvvvvv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ