EndWork
Runing
ServiceMain
Working
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
JaffaCakes118_627796b3a2378a52a97de4a208b0e882.dll
Resource
win7-20240903-en
Target
JaffaCakes118_627796b3a2378a52a97de4a208b0e882
Size
124KB
MD5
627796b3a2378a52a97de4a208b0e882
SHA1
067d7a0076761ab7a0508fbad6f8b7cee6f2b531
SHA256
ad90b73ca0ba3aaabeb490445c123e2f2f79e1f29fed52a5c79bd1c2c5f16bdd
SHA512
239ea01d7bb8b0994890d82e493d6696c032f3495ccd6e24fa7cce191773593830dec0ebffaa839f9b8ed8d78ea0c067fc66305bb95fc7cfac88937bdc0fd1da
SSDEEP
3072:Bzk9z4Uh+yQAbAbu7NWtMpebimeN7kgMwzi/:uDTQAbbMbxg7kVwz
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_627796b3a2378a52a97de4a208b0e882 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
FreeLibrary
CloseHandle
TerminateThread
Sleep
WaitForSingleObject
SetEvent
DeleteCriticalSection
VirtualFree
VirtualAlloc
GetLastError
ResetEvent
InterlockedExchange
CancelIo
GetTickCount
GetLocalTime
GetCurrentProcessId
HeapAlloc
GetProcessHeap
DeleteFileA
CreateDirectoryA
GetFileAttributesA
lstrcpyA
lstrlenA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
lstrcatA
CreateProcessA
Process32Next
lstrcmpiA
Process32First
HeapFree
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
OpenProcess
GetCurrentThreadId
GlobalMemoryStatus
GetVersionExA
OpenEventA
SetErrorMode
GetCurrentProcess
GetWindowsDirectoryA
SetFileAttributesA
CopyFileA
ExpandEnvironmentStringsA
GetModuleFileNameA
CreateFileA
RaiseException
strncpy
free
malloc
_except_handler3
strrchr
_beginthreadex
atoi
wcstombs
sprintf
srand
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
rand
_CxxThrowException
strstr
_ftol
ceil
putchar
memmove
__CxxFrameHandler
puts
_access
??3@YAXPAX@Z
??2@YAPAXI@Z
_strrev
_stricmp
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
EndWork
Runing
ServiceMain
Working
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ