Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
af811dc82e84cb34dcdbb61b65e842b3ecbf44ee7375d4c60fab594ecb886661.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
af811dc82e84cb34dcdbb61b65e842b3ecbf44ee7375d4c60fab594ecb886661.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_caecd4bc46d1e621a68e1d844a6ff423d3496222aa26e8437ea2a259eabe8963
-
Size
222KB
-
MD5
e6f99a00572a07dac1e9699fe0929233
-
SHA1
3a8ddaabed6532e9f2a413aa61b309842636c25d
-
SHA256
caecd4bc46d1e621a68e1d844a6ff423d3496222aa26e8437ea2a259eabe8963
-
SHA512
2daf6573bbe779207c73230cc6d42b306798a7b932778c6640c758a6666551c608ada54c2951a0566111b803281d162b87110f6ce7f2733ed9264a05aeffe963
-
SSDEEP
6144:cOmstAlgnNeNtYAcf3bJ68WA/1n7ojD247ws/be4ElblF0w:RmstigotYAO3VJWtas6RlIw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/af811dc82e84cb34dcdbb61b65e842b3ecbf44ee7375d4c60fab594ecb886661
Files
-
JaffaCakes118_caecd4bc46d1e621a68e1d844a6ff423d3496222aa26e8437ea2a259eabe8963.zip
Password: infected
-
af811dc82e84cb34dcdbb61b65e842b3ecbf44ee7375d4c60fab594ecb886661.exe windows:6 windows x86 arch:x86
48cf05311e4a3e8be7b754cbebbc2209
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
CreateToolbarEx
CreateStatusWindowW
PropertySheetW
kernel32
GetLocalTime
VirtualProtect
GetModuleHandleW
LoadLibraryW
HeapFree
lstrcmpW
lstrcmpiW
lstrcpynW
lstrcpyW
lstrcatW
lstrlenW
GetDateFormatW
GetTimeFormatW
GetModuleHandleA
HeapReAlloc
HeapAlloc
GetLastError
CloseHandle
WriteFile
SetFilePointer
GetProcessHeap
ReadFile
CreateFileW
GetCommandLineW
MulDiv
GetStartupInfoA
user32
InvalidateRect
SetWindowTextA
SetWindowTextW
GetWindowTextA
GetWindowTextW
GetWindowTextLengthW
GetClientRect
GetWindowRect
MessageBoxA
MessageBoxW
MessageBoxIndirectW
ClientToScreen
MapWindowPoints
GetSysColorBrush
IntersectRect
IsRectEmpty
GetWindowLongW
ReleaseDC
LoadCursorW
LoadIconW
LoadImageW
IsDialogMessageW
MonitorFromRect
GetMonitorInfoW
TrackPopupMenu
PostQuitMessage
DefWindowProcW
PostMessageW
SendMessageW
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
RegisterWindowMessageW
wsprintfW
LoadStringW
GetDC
RegisterClassExW
GrayStringW
SetMenuItemInfoW
TrackPopupMenuEx
GetSubMenu
EnableMenuItem
CheckMenuItem
SetMenu
GetMenu
LoadMenuW
GetSystemMetrics
TranslateAcceleratorW
LoadAcceleratorsW
EnableWindow
SetFocus
IsDlgButtonChecked
CheckRadioButton
CheckDlgButton
GetDlgItem
EndDialog
DialogBoxParamW
IsWindowVisible
MoveWindow
GetMenuItemInfoW
ShowWindow
SetWindowLongW
CreateWindowExW
SetActiveWindow
gdi32
GetDeviceCaps
SelectObject
GetTextExtentPointW
EnumFontFamiliesExW
comdlg32
ChooseFontW
ReplaceTextW
GetSaveFileNameW
GetOpenFileNameW
FindTextW
shell32
DragAcceptFiles
DragFinish
DragQueryFileW
ShellAboutW
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
memset
memcpy
isspace
atoi
wcstod
qsort
_errno
_onexit
__dllonexit
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ