EndWork
Runing
ServiceMain
mxiangh
Target
JaffaCakes118_9abd4a0b15ad11f719d8436b543a214f
Size
937KB
MD5
9abd4a0b15ad11f719d8436b543a214f
SHA1
8c2433df153c51fce295e865e21aa3d0bb268b94
SHA256
2a34fbd1537024187733fe1ac595ea1e2ab10b33d94b3370d071d223a2135672
SHA512
9a638ca3af9f53c8f040914f2238c4ad47426aaf6b16705cf916e61e4a6faf468391be4a2e8b8c247576eb2aa7d9edb413cd47f66c170a65497b6cdc0c35c658
SSDEEP
3072:JKIO+FY3VDkdrIPizmawJB9HFkJEa1Q1qIpkuoZW/vkdD:dY3Y0PqgDpqEO4qOWZWnW
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_9abd4a0b15ad11f719d8436b543a214f |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFilePointer
MoveFileA
CreateProcessA
CreateThread
InitializeCriticalSection
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
HeapFree
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
LocalSize
GlobalFree
GlobalUnlock
GlobalLock
ReadFile
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
TerminateProcess
OpenProcess
GlobalMemoryStatus
OpenEventA
SetErrorMode
GetCurrentProcess
SetFileAttributesA
WriteFile
CreateFileA
CopyFileA
CreateEventA
ExpandEnvironmentStringsA
GetModuleFileNameA
GetFileSize
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
GetFileAttributesA
CreateDirectoryA
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
GetWindowsDirectoryA
lstrcpyA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
ResetEvent
GetLastError
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
ResumeThread
SetEvent
WaitForSingleObject
Sleep
TerminateThread
CloseHandle
FreeLibrary
LoadLibraryA
GetProcAddress
GlobalAlloc
wsprintfA
CharNextA
GetWindowTextA
MessageBoxA
LoadCursorA
BlockInput
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
GetMessageA
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
DestroyCursor
GetCursorInfo
GetCursorPos
ExitWindowsEx
GetWindowThreadProcessId
LoadIconA
RegisterClassA
LoadMenuA
TranslateMessage
DispatchMessageA
SetClipboardData
CreateWindowExA
CloseWindow
IsWindow
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetStockObject
GetLengthSid
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
DeleteService
OpenServiceA
OpenSCManagerA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegRestoreKeyA
RegSaveKeyA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
RegOpenKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
StartServiceA
AdjustTokenPrivileges
LookupPrivilegeValueA
SHGetSpecialFolderPathA
_strcmpi
_strrev
_except_handler3
_strnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
srand
_access
wcstombs
_beginthreadex
wcscpy
_errno
strncmp
atoi
strrchr
_stricmp
free
malloc
strchr
strncpy
sprintf
rand
_CxxThrowException
strstr
_ftol
ceil
putchar
memmove
__CxxFrameHandler
puts
??3@YAXPAX@Z
??2@YAPAXI@Z
getsockname
bind
getpeername
accept
listen
recvfrom
__WSAFDIsSet
ntohs
inet_ntoa
htonl
WSASocketA
sendto
connect
inet_addr
send
closesocket
select
socket
gethostbyname
htons
setsockopt
WSAStartup
WSACleanup
WSAIoctl
recv
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
NetUserAdd
NetLocalGroupAddMembers
WTSFreeMemory
WTSQuerySessionInformationA
EndWork
Runing
ServiceMain
mxiangh
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ