Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
bce1c3666ad026adcae65c8e6d5daeb4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bce1c3666ad026adcae65c8e6d5daeb4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bce1c3666ad026adcae65c8e6d5daeb4_JaffaCakes118
-
Size
1.3MB
-
MD5
bce1c3666ad026adcae65c8e6d5daeb4
-
SHA1
3b335072d22fdb462cc232432d30f6491a6e24e2
-
SHA256
d2234828bf8fc7f1db8373811dd0fb2dad3da0320a09d564889f14407b9604ec
-
SHA512
5fe5957dd9d7c11c99cb3535bceca262a03969010277a42280a3c4f5609796628486db3f053570b3d89524c9958dffc00197e4db4f105d44f403bc50b7950aff
-
SSDEEP
24576:+JZZsC/dxMKkp3JBRvqwTlXndGn2xLbxAokPHYcheRlaL8tle546gLGCxX/DbG:+JZZZJQ3JBRvqwTlXd+czp9pNtPfG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bce1c3666ad026adcae65c8e6d5daeb4_JaffaCakes118
Files
-
bce1c3666ad026adcae65c8e6d5daeb4_JaffaCakes118.exe windows:4 windows x86 arch:x86
6d14fd9b30a9775082c77733ea51c44f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CompareStringA
CompareStringW
CreateEventA
CreateFileA
CreateProcessA
CreateThread
DeleteCriticalSection
EnterCriticalSection
EnumCalendarInfoA
EnumResourceLanguagesA
EnumResourceNamesA
EnumResourceTypesA
ExitProcess
ExitThread
FindResourceA
FindResourceExA
FormatMessageA
FreeLibrary
FreeResource
GetCommandLineA
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetThreadContext
GetThreadLocale
GetThreadPriority
GetUserDefaultLCID
GetVersionExA
GetWindowsDirectoryA
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadResource
LocalAlloc
LocalFree
LockResource
MultiByteToWideChar
ReadFile
ReadProcessMemory
ResetEvent
ResumeThread
SetEndOfFile
SetEvent
SetFilePointer
SetLastError
SetThreadContext
SetThreadLocale
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
TerminateThread
TlsAlloc
TlsGetValue
TlsSetValue
TryEnterCriticalSection
VirtualAllocEx
VirtualFree
VirtualProtectEx
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
WriteProcessMemory
ntdll
NtUnmapViewOfSection
ole32
IsEqualGUID
oleaut32
SafeArrayAccessData
SafeArrayCreate
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayRedim
SafeArrayUnaccessData
SysAllocStringLen
SysFreeString
SysReAllocStringLen
VariantChangeTypeEx
VariantClear
VariantCopy
VariantInit
user32
CharLowerA
CharLowerBuffA
CharLowerBuffW
CharUpperA
CharUpperBuffA
CharUpperBuffW
GetSystemMetrics
MessageBeep
MessageBoxA
Sections
.text Size: 243KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 21KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_MEM_DISCARDABLE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.stab Size: 33KB - Virtual size: 33KB
IMAGE_SCN_MEM_DISCARDABLE
.stabstr Size: 100KB - Virtual size: 100KB
IMAGE_SCN_MEM_DISCARDABLE