CanUnloadNow
DarkAngel
GetClassObject
RegisterServer
UnregisterServer
Behavioral task
behavioral1
Sample
JaffaCakes118_5e783049dbd6739cab598a8e4f5789b0.dll
Resource
win7-20240729-en
Target
JaffaCakes118_5e783049dbd6739cab598a8e4f5789b0
Size
131KB
MD5
5e783049dbd6739cab598a8e4f5789b0
SHA1
dc9c7f5222270186d9963397b4fedd506da58ac9
SHA256
0efcc71442aa5d7f2ccbf8a51bdea06c5cb18cf935f6b96b4eefde6a53358eb2
SHA512
16481682aba157fbb9200f9a1dc3be4981b5e40b5c753d4bce175f9b33cd61693d05d36ffcf562aca2a71acfd019a37d171177148bfb88593f8abfc5963685d8
SSDEEP
3072:PWLeYPiFfs8qr+Nw7h+Feu4g8qbACPAKJrV3MIdo47:Bs8qVTohAM1laISc
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_5e783049dbd6739cab598a8e4f5789b0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
Sleep
LoadLibraryA
GetProcAddress
LoadIconA
RegisterClassA
LoadMenuA
CreateWindowExA
CloseWindow
IsWindow
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
GetCursorPos
GetCursorInfo
DestroyCursor
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
MapVirtualKeyA
GetMessageA
TranslateMessage
DispatchMessageA
keybd_event
wsprintfA
CharNextA
ExitWindowsEx
GetWindowTextA
MessageBoxA
LoadCursorA
BlockInput
SendMessageA
SetCapture
GetStockObject
SHGetSpecialFolderPathA
calloc
srand
_access
??1type_info@@UAE@XZ
_beginthreadex
_errno
strncmp
strrchr
atoi
_except_handler3
_initterm
malloc
strchr
strncpy
sprintf
rand
_CxxThrowException
strstr
_ftol
ceil
putchar
memmove
__CxxFrameHandler
puts
??3@YAXPAX@Z
??2@YAPAXI@Z
_adjust_fdiv
free
_strnicmp
_strrev
_stricmp
wcstombs
_strcmpi
bind
getpeername
accept
listen
recvfrom
__WSAFDIsSet
getsockname
ntohs
inet_ntoa
htonl
sendto
connect
inet_addr
send
closesocket
select
recv
htons
setsockopt
WSACleanup
WSAStartup
gethostbyname
socket
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
WTSQuerySessionInformationA
WTSFreeMemory
CanUnloadNow
DarkAngel
GetClassObject
RegisterServer
UnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ