??4CTraceColumnWRAP@@QAEAAV0@ABV0@@Z
??4CTraceException@@QAEAAV0@ABV0@@Z
??4CTraceStatement@@QAEAAV0@ABV0@@Z
?GetError@CTraceException@@QAEJF@Z
?GetErrorMessage@CTraceException@@QAEPAGF@Z
Behavioral task
behavioral1
Sample
6a2f3f96c13732e3d55846fa86333d16_JaffaCakes118.exe
Resource
win7-20240705-en
Target
6a2f3f96c13732e3d55846fa86333d16_JaffaCakes118
Size
192KB
MD5
6a2f3f96c13732e3d55846fa86333d16
SHA1
cc562f4df03968b428401e692beac375ab741024
SHA256
f9ad6cf2658808e5df62d1d3f87474296f70f5e131b50695b38062b5e11135ba
SHA512
f8d6b3a638a0e2fccc0bb4f5acfe37acf8b86315c3a2e77cdc856cea6386777cb8c229dd8f1789195feb4308738225dae2df756d08cd8bd8f69bbab53229a205
SSDEEP
3072:UoUfUx58f7GxDDNVXdMZVsJ0oYDgsDgQ3RZKrsW51jgDryMf41g9RD+sm4Ozr670:Uo/x58f7GxDJVX+ZXSsW512yMQqSyfA
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
6a2f3f96c13732e3d55846fa86333d16_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WriteFile
GetComputerNameA
RaiseException
GetLastError
CreateFileA
GetVersionExA
GetFullPathNameA
ReadFile
WideCharToMultiByte
GlobalFree
GlobalAlloc
CopyFileA
FindClose
GetTempFileNameA
GetTempPathA
WaitForSingleObject
CreateProcessA
MultiByteToWideChar
LocalFree
FormatMessageW
CreateProcessW
SetStdHandle
GetStdHandle
SearchPathW
CreateFileW
DeleteFileA
FlushFileBuffers
SearchPathA
FindFirstFileA
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
InterlockedIncrement
HeapReAlloc
LeaveCriticalSection
GetEnvironmentStrings
RtlUnwind
FreeEnvironmentStringsA
UnhandledExceptionFilter
FreeEnvironmentStringsW
LCMapStringA
LCMapStringW
VirtualFree
HeapCreate
GetCPInfo
SetFilePointer
TlsGetValue
SetLastError
CloseHandle
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetEnvironmentStringsW
GetProcAddress
FreeLibrary
LocalAlloc
InterlockedExchange
LoadLibraryA
EnterCriticalSection
DeleteCriticalSection
VirtualAlloc
HeapFree
HeapAlloc
InterlockedDecrement
SetHandleCount
GetCommandLineA
GetVersion
ExitProcess
InitializeCriticalSection
GetStartupInfoA
GetEnvironmentVariableA
HeapDestroy
GetFileType
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetModuleFileNameA
CoGetMalloc
RegOpenKeyExA
RegEnumValueA
RegQueryValueExA
RegCloseKey
SHGetSpecialFolderLocation
SHGetPathFromIDListA
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
ord3
ord31
ord72
ord136
ord5
ord8
ord11
ord18
ord61
ord43
ord13
ord45
?SetUser@CTraceConnection@@QAEJPBG@Z
?GetVersion@CTraceConnection@@QAEJPAE0@Z
??1CTraceConnection@@QAE@XZ
?IsConnected@CTraceConnection@@QAEJPAH@Z
?SetServer@CTraceConnection@@QAEJPBG@Z
?SetTrusted@CTraceConnection@@QAEJH@Z
?SetPassword@CTraceConnection@@QAEJPBG@Z
?Connect@CTraceConnection@@QAEJXZ
?GetHENV@CTraceConnection@@QAEJPAPAX@Z
?GetHDBC@CTraceConnection@@QAEJPAPAX@Z
??0CTraceConnection@@QAE@XZ
?SetApplicationName@CTraceConnection@@QAEJPBG@Z
?SetDatabase@CTraceConnection@@QAEJPBG@Z
?Disconnect@CTraceConnection@@QAEJXZ
??4CTraceColumnWRAP@@QAEAAV0@ABV0@@Z
??4CTraceException@@QAEAAV0@ABV0@@Z
??4CTraceStatement@@QAEAAV0@ABV0@@Z
?GetError@CTraceException@@QAEJF@Z
?GetErrorMessage@CTraceException@@QAEPAGF@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE