ForBug_four
ForBug_one
ForBug_three
ForBug_two
ServiceMain
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
JaffaCakes118_36bb78f1382d691b8a9db74972f43dad.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_36bb78f1382d691b8a9db74972f43dad.dll
Resource
win10v2004-20250217-en
Target
JaffaCakes118_36bb78f1382d691b8a9db74972f43dad
Size
66KB
MD5
36bb78f1382d691b8a9db74972f43dad
SHA1
7593a86a20f5b153aa42ada1200fa2c03be0cbac
SHA256
92aea5231f753c0acc4ef318cc1d1c800be308c59826dd0e196567ccd855898c
SHA512
147a11ec30ece8192b7e87d278c9fb80bc0115ff8a14a5fe691925d67f02490be0237eb9d194ed98ae688c83dad60a3c5177f18b4a99ed5d7d8251c44f15dc55
SSDEEP
1536:zl0eXJIi9YdvYaZcGBHfr6evtOwEyR7z4/:zlzIi9JaZJB/r6el1EyR7zW
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_36bb78f1382d691b8a9db74972f43dad |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
SetLastError
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetTickCount
TerminateThread
MoveFileExA
GetSystemDirectoryA
GetStartupInfoA
MoveFileA
SetFilePointer
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
CreatePipe
WriteFile
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
InitializeCriticalSection
LoadLibraryA
GetProcAddress
FreeLibrary
lstrcatA
lstrlenA
Sleep
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
DisconnectNamedPipe
CharNextA
OpenDesktopA
GetThreadDesktop
wsprintfA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetUserObjectInformationA
ControlService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegisterServiceCtrlHandlerA
SetServiceStatus
SHGetFileInfoA
SHDeleteKeyA
_strnicmp
_strcmpi
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
??2@YAPAXI@Z
_CxxThrowException
strchr
malloc
free
_except_handler3
strrchr
strncpy
strncat
realloc
atoi
wcstombs
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
recv
ntohs
socket
closesocket
htons
connect
setsockopt
select
send
gethostname
gethostbyname
WSAIoctl
WSACleanup
WSAStartup
getsockname
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
capGetDriverDescriptionA
ForBug_four
ForBug_one
ForBug_three
ForBug_two
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ