EndWork
Runing
ServiceMain
Working
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
JaffaCakes118_66d69dd6c1358b3da514434e7fed7974.dll
Resource
win7-20240729-en
Target
JaffaCakes118_66d69dd6c1358b3da514434e7fed7974
Size
69KB
MD5
66d69dd6c1358b3da514434e7fed7974
SHA1
cbfc8fc51962dca4ae02729609d793e00f00f0c2
SHA256
1a7a8e2d108fcbb78e84297e0711872ebe00301bb1242a50ed11989757b5a917
SHA512
cc3f6a4aae22403cfed04014a0cb39afb22c506ddbc6cfee97c13b20357d8eb288b24da3aa0d7d4e7b4c4f6182a9e1738843bc88b0640b3ed8cefa597786fde2
SSDEEP
1536:5twrJc9PSf8tSjetUhsSEy1cwRxX/kByrP1B:56rJiPk8tSws0yzxX/kByb1B
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_66d69dd6c1358b3da514434e7fed7974 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
GetProcAddress
LoadLibraryA
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
Sleep
VirtualAlloc
CloseHandle
WaitForSingleObject
GetLastError
ResetEvent
SetEvent
InterlockedExchange
CancelIo
GetTickCount
GetLocalTime
CreateThread
GetCurrentProcessId
HeapAlloc
GetProcessHeap
CreateProcessA
WinExec
lstrcpyA
TerminateThread
DeleteFileA
lstrcatA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
GlobalMemoryStatus
GetSystemInfo
GetComputerNameA
GetVersionExA
OpenEventA
SetErrorMode
CreateDirectoryA
GetCurrentProcess
lstrlenA
GetWindowsDirectoryA
SetFileAttributesA
SetFilePointer
CopyFileA
ExpandEnvironmentStringsA
GetModuleFileNameA
ReadFile
CreateFileA
RaiseException
LocalAlloc
ceil
_ftol
puts
strstr
__CxxFrameHandler
??2@YAPAXI@Z
_CxxThrowException
rand
sprintf
strncpy
strrchr
malloc
_beginthreadex
atoi
wcstombs
_access
srand
calloc
free
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
putchar
memmove
??3@YAXPAX@Z
_strrev
_stricmp
EndWork
Runing
ServiceMain
Working
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ