Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
e2cfc6f8656c2ab1934d32cfab708c04_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2cfc6f8656c2ab1934d32cfab708c04_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e2cfc6f8656c2ab1934d32cfab708c04_JaffaCakes118
-
Size
188KB
-
MD5
e2cfc6f8656c2ab1934d32cfab708c04
-
SHA1
2e68f708e31fdf7dac196c20accc6f51f1ff652f
-
SHA256
4037c6cbfedecaeab0b515c75aa8496d49020adefbd4dc10e0db2b9f69ce3e49
-
SHA512
7521a8e4a4a7d67cefe398d8c6632e5cbf0cb2968ec22583544d7d3a185772ccc466e2fa7e50af21bc29958b579ae166224a24236fc6d67571ac454d8f490855
-
SSDEEP
3072:DQbz3nYOihhTLZgVk4KPe7TAP8sdM57wgBbDNlP4mttAa8sOOCmM+R:DGYNhhvKqRWTsBdM7bBb3AKAQO8H
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2cfc6f8656c2ab1934d32cfab708c04_JaffaCakes118
Files
-
e2cfc6f8656c2ab1934d32cfab708c04_JaffaCakes118.exe windows:4 windows x86 arch:x86
6f97a4e01162278e360777b21e57392d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_ftol
strncpy
strrchr
__CxxFrameHandler
memcpy
srand
??2@YAPAXI@Z
memmove
rand
strstr
strlen
memset
strchr
malloc
free
_strrev
_strlwr
_strupr
_except_handler3
kernel32
GetTempPathA
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
GetStartupInfoA
SetFileAttributesA
DeleteFileA
GetFileAttributesA
CreateDirectoryA
GetCurrentProcess
IsBadReadPtr
SetUnhandledExceptionFilter
GetSystemDirectoryA
ExpandEnvironmentStringsA
GetShortPathNameA
GetTickCount
GetLastError
CreateEventA
WaitForSingleObject
Sleep
GetModuleFileNameA
SleepEx
lstrlenA
CreateFileA
GetCurrentThreadId
WriteFile
GetWindowsDirectoryA
GetFileTime
SetFileTime
CloseHandle
MoveFileA
GetModuleHandleA
ExitProcess
LoadLibraryA
GetProcAddress
GetCurrentDirectoryA
VirtualProtect
GetModuleFileNameA
ExitProcess
ws2_32
closesocket
getprotobynumber
user32
MessageBoxA
Sections
.text Size: - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 152KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ