Fun
Ghostzjz
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
JaffaCakes118_65638dd492a139652bc11b15d6810920.dll
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_65638dd492a139652bc11b15d6810920.dll
Resource
win10v2004-20250217-en
Target
JaffaCakes118_65638dd492a139652bc11b15d6810920
Size
510KB
MD5
65638dd492a139652bc11b15d6810920
SHA1
bf8f274d1a9cfb3e0e024bd0fa760e5dbb0185c9
SHA256
0d07b7a79d1d2a652f8752870ab403b08b52729ad6f2211a2cdecd84331dccdf
SHA512
6fc5256bc3c24e6d29fc87fd137a50f3d01b49207376274fb344cb1c32207e53d2a5517be514538d98ce985e6a026227d04e4f55d472e83e6125727029e4e8ce
SSDEEP
12288:8Nu/ZASg31gAOOzA7PplgAhPXr+TsvpJtWdxDiVl3XWyHM5/lBl:80/ZASg31gAO/BlgAhPXr+TsvpJIx4lo
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_65638dd492a139652bc11b15d6810920 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHDeleteKeyA
_adjust_fdiv
_initterm
_onexit
__dllonexit
??1type_info@@UAE@XZ
_strcmpi
vsprintf
sprintf
_purecall
calloc
_beginthreadex
wcstombs
realloc
strncat
printf
time
srand
rand
wcscpy
_errno
strncmp
_snprintf
atoi
strncpy
strrchr
_except_handler3
free
malloc
strchr
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
_strnicmp
waveOutClose
waveOutReset
waveOutUnprepareHeader
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveInStart
waveInAddBuffer
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
WSAStartup
WSACleanup
WSAIoctl
setsockopt
listen
getsockname
getpeername
bind
gethostname
WSAGetLastError
inet_ntoa
accept
sendto
recvfrom
htonl
connect
htons
gethostbyname
socket
ntohs
recv
closesocket
select
send
ioctlsocket
WSASocketA
__WSAFDIsSet
inet_addr
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
ord537
ord6648
ord2764
ord4129
ord926
ord924
ord922
ord535
ord858
ord6663
ord860
ord4278
ord2818
ord939
ord6877
ord800
ord540
CreateMutexA
SetUnhandledExceptionFilter
GetModuleFileNameA
SetErrorMode
Process32Next
Process32First
lstrcmpiA
GetCurrentThreadId
OpenEventA
ReleaseMutex
GetSystemInfo
WaitForMultipleObjects
PeekNamedPipe
TerminateProcess
DisconnectNamedPipe
CreatePipe
FreeConsole
GetStartupInfoA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
VirtualAlloc
LocalSize
UnmapViewOfFile
HeapAlloc
CreateFileMappingA
MapViewOfFile
GetProcessHeap
GetLocalTime
MoveFileExA
GetTickCount
ExitThread
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
GetSystemDirectoryA
SetLastError
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
Sleep
GetProcAddress
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
HeapFree
IsWindowVisible
EnumWindows
CloseDesktop
OpenInputDesktop
GetUserObjectInformationA
PostMessageA
CreateWindowExA
CloseWindow
ShowWindow
GetClientRect
EmptyClipboard
SetClipboardData
CloseClipboard
keybd_event
SetCursorPos
WindowFromPoint
GetWindowThreadProcessId
MapVirtualKeyA
SendMessageA
SystemParametersInfoA
BlockInput
DestroyCursor
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetKeyNameTextA
GetActiveWindow
GetWindowTextA
wsprintfA
MessageBoxA
CharNextA
GetMessageA
TranslateMessage
DispatchMessageA
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
SetCapture
SelectObject
CreateCompatibleBitmap
GetDIBits
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegCreateKeyExA
OpenSCManagerA
CloseServiceHandle
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegQueryValueA
RegOpenKeyExA
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
RegCreateKeyA
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
EnumServicesStatusA
StartServiceA
CreateProcessAsUserA
SetTokenInformation
QueryServiceConfigA
UnlockServiceDatabase
ChangeServiceConfigA
GetTokenInformation
LookupAccountSidA
SetServiceStatus
RegisterServiceCtrlHandlerA
DuplicateTokenEx
LockServiceDatabase
SHGetFileInfoA
SHGetSpecialFolderPathA
CoTaskMemFree
CoCreateInstance
CoInitialize
SysFreeString
NetUserAdd
NetLocalGroupAddMembers
ImmGetContext
ImmReleaseContext
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
WTSQuerySessionInformationA
WTSFreeMemory
WTSQueryUserToken
CreateEnvironmentBlock
GetModuleFileNameExA
EnumProcessModules
Fun
Ghostzjz
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ