Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3extracted_at_0x0.exe
windows7-x64
10extracted_at_0x0.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Lib.Platfo...ve.dll
windows7-x64
1Lib.Platfo...ve.dll
windows10-2004-x64
1vmxnet3.html
windows7-x64
3vmxnet3.html
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
extracted_at_0x0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
extracted_at_0x0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Lib.Platform.Windows.Native.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Lib.Platform.Windows.Native.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
vmxnet3.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
vmxnet3.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f97e7763f53610fb7915fa5ee7d0fd649749281f6ea3c6774d044c641cc32a86
-
Size
338KB
-
MD5
7d3a374530eca69928f7ecb004b261de
-
SHA1
641e6186958df82256d6b08672145a02386a5530
-
SHA256
f97e7763f53610fb7915fa5ee7d0fd649749281f6ea3c6774d044c641cc32a86
-
SHA512
222a12a540aabb80d5e5eb0c116952b6dcb844c3e1d855fcd96fdc0093d329b7d3ddcf987f4f1e594dcabfebe56eb51caac43d0482ee5f8810d7114db8feea24
-
SSDEEP
6144:NH++174+frkj3qNyMa3cbOr0HZh7NEr67w8UsmRv3StGoj7LK6HsFR04GiGNV4/y:NH++1U+fgXro0OwImRv0fLKbR04G3V4K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack002/$PLUGINSDIR/System.dll
Files
-
JaffaCakes118_f97e7763f53610fb7915fa5ee7d0fd649749281f6ea3c6774d044c641cc32a86.zip
Password: infected
-
extracted_at_0x0.exe.bin.exe windows:4 windows x86 arch:x86
e221f4f7d36469d53810a4b5f9fc8966
Code Sign
50:94:28:8c:de:fe:e2:45Certificate
IssuerOU=Velholdte Timoteen Ciceroni\ ,O=Gloriously,L=Northfield,ST=Ohio,C=US,1.2.840.113549.1.9.1=#0c1b4469706c6f6d6174696b6b656e7340456765746d6d65722e54726fNot Before08/02/2022, 01:38Not After07/02/2025, 01:38SubjectOU=Velholdte Timoteen Ciceroni\ ,O=Gloriously,L=Northfield,ST=Ohio,C=US,1.2.840.113549.1.9.1=#0c1b4469706c6f6d6174696b6b656e7340456765746d6d65722e54726f88:fb:d9:4c:af:78:31:54:ad:ac:0c:7c:d3:2f:38:08:57:b4:b1:ca:32:1b:8a:20:aa:f5:46:87:81:fb:ca:46Signer
Actual PE Digest88:fb:d9:4c:af:78:31:54:ad:ac:0c:7c:d3:2f:38:08:57:b4:b1:ca:32:1b:8a:20:aa:f5:46:87:81:fb:ca:46Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareFileTime
SearchPathW
SetFileTime
CloseHandle
GetShortPathNameW
MoveFileW
SetCurrentDirectoryW
GetFileAttributesW
GetLastError
GetFullPathNameW
CreateDirectoryW
Sleep
GetTickCount
CreateFileW
GetFileSize
GetModuleFileNameW
GetCurrentProcess
CopyFileW
ExitProcess
SetEnvironmentVariableW
GetWindowsDirectoryW
SetFileAttributesW
ExpandEnvironmentStringsW
SetErrorMode
LoadLibraryW
lstrlenW
lstrcpynW
GetDiskFreeSpaceW
GlobalUnlock
GlobalLock
CreateThread
CreateProcessW
RemoveDirectoryW
lstrcmpiA
GetTempFileNameW
lstrcpyA
lstrcpyW
lstrcatW
GetSystemDirectoryW
GetVersion
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetModuleHandleW
lstrcmpiW
lstrcmpW
WaitForSingleObject
GlobalFree
GlobalAlloc
LoadLibraryExW
GetExitCodeProcess
FreeLibrary
WritePrivateProfileStringW
GetCommandLineW
GetTempPathW
GetPrivateProfileStringW
FindFirstFileW
FindNextFileW
DeleteFileW
SetFilePointer
ReadFile
FindClose
MulDiv
MultiByteToWideChar
WriteFile
lstrlenA
WideCharToMultiByte
user32
EndDialog
ScreenToClient
GetWindowRect
RegisterClassW
EnableMenuItem
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongW
SetCursor
LoadCursorW
CheckDlgButton
GetMessagePos
LoadBitmapW
CallWindowProcW
IsWindowVisible
CloseClipboard
SetClipboardData
wsprintfW
CreateWindowExW
SystemParametersInfoW
AppendMenuW
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharPrevW
CharNextA
wsprintfA
DispatchMessageW
PeekMessageW
ReleaseDC
EnableWindow
InvalidateRect
SendMessageW
DefWindowProcW
BeginPaint
GetClientRect
FillRect
DrawTextW
GetClassInfoW
DialogBoxParamW
CharNextW
ExitWindowsEx
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
GetDC
SetWindowLongW
LoadImageW
SendMessageTimeoutW
FindWindowExW
EmptyClipboard
OpenClipboard
TrackPopupMenu
EndPaint
ShowWindow
GetDlgItem
IsWindow
SetForegroundWindow
gdi32
SelectObject
SetBkMode
CreateFontIndirectW
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteW
SHFileOperationW
advapi32
RegCloseKey
RegOpenKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumValueW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegEnumKeyW
comctl32
ImageList_Create
ImageList_AddMasked
ImageList_Destroy
ord17
ole32
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 156KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
$PLUGINSDIR/System.dll.dll windows:4 windows x86 arch:x86
fc0224e99e736751432961db63a41b76
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleHandleW
GlobalFree
GlobalSize
lstrcpynW
lstrcpyW
GetProcAddress
WideCharToMultiByte
VirtualFree
FreeLibrary
lstrlenW
LoadLibraryW
GlobalAlloc
MultiByteToWideChar
VirtualAlloc
VirtualProtect
GetLastError
user32
wsprintfW
ole32
StringFromGUID2
CLSIDFromString
Exports
Exports
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 835B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 578B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Desamidase.bmp
-
Lib.Platform.Windows.Native.dll.dll windows:6 windows x64 arch:x64
dc6545082ecd0d2498d23b2e46d671a8
Code Sign
79:1e:f6:8f:38:29:95:dc:06:5f:30:0d:46:01:a9:99Certificate
IssuerCN=Sectigo RSA Code Signing CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before20/06/2020, 00:00Not After20/06/2023, 23:59SubjectCN=AIRVPN,O=AIRVPN,POSTALCODE=06131,STREET=Via Del Sagittario\, 4,L=Perugia,ST=Perugia,C=ITExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
39:72:44:3a:f9:22:b7:51:d7:d3:6c:10:dd:31:35:95Certificate
IssuerCN=AAA Certificate Services,O=Comodo CA Limited,L=Salford,ST=Greater Manchester,C=GBNot Before12/03/2019, 00:00Not After31/12/2028, 23:59SubjectCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
1d:a2:48:30:6f:9b:26:18:d0:82:e0:96:7d:33:d3:6aCertificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/11/2018, 00:00Not After31/12/2030, 23:59SubjectCN=Sectigo RSA Code Signing CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
8c:77:a0:00:8f:f4:d1:b0:c6:3d:9f:3a:48:83:8d:6bCertificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before23/10/2020, 00:00Not After22/01/2032, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #2,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
78:75:34:a3:09:1b:b9:02:a8:6f:c2:9c:38:4a:e8:32:cc:54:90:17:05:c0:26:a7:7e:90:96:97:dc:27:3d:9dSigner
Actual PE Digest78:75:34:a3:09:1b:b9:02:a8:6f:c2:9c:38:4a:e8:32:cc:54:90:17:05:c0:26:a7:7e:90:96:97:dc:27:3d:9dDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
d:\Projects\AirVPN\Repo\eddie-air\src\Lib.Platform.Windows.Native\bin\x64\Release\Lib.Platform.Windows.Native.pdb
Imports
msvcp140
?_Xbad_function_call@std@@YAXXZ
?_Xlength_error@std@@YAXPEBD@Z
iphlpapi
GetIpInterfaceEntry
InitializeIpInterfaceEntry
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memmove
strrchr
strchr
memcpy
memset
strstr
__std_type_info_destroy_list
__std_exception_copy
__C_specific_handler
__std_terminate
memcmp
memchr
__std_exception_destroy
_CxxThrowException
api-ms-win-crt-math-l1-1-0
_dsign
_dclass
api-ms-win-crt-convert-l1-1-0
strtoul
strtol
atoi
strtoull
strtoll
strtod
api-ms-win-crt-string-l1-1-0
strcspn
strncpy
strcmp
strpbrk
tolower
strcpy_s
strncmp
isupper
strspn
_strdup
api-ms-win-crt-locale-l1-1-0
localeconv
api-ms-win-crt-runtime-l1-1-0
_initterm_e
_invalid_parameter_noinfo_noreturn
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_beginthreadex
_execute_onexit_table
_errno
_cexit
_getpid
strerror
__sys_nerr
_initterm
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf
fopen
_lseeki64
fputs
__stdio_common_vsscanf
fwrite
fread
fputc
_read
fseek
ftell
_write
_close
fgets
fflush
_open
__acrt_iob_func
fclose
api-ms-win-crt-heap-l1-1-0
_callnewh
realloc
calloc
malloc
free
api-ms-win-crt-time-l1-1-0
_time64
_gmtime64
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-filesystem-l1-1-0
_fstat64
_stat64
_access
api-ms-win-crt-environment-l1-1-0
getenv
ws2_32
getaddrinfo
freeaddrinfo
recvfrom
sendto
gethostname
ntohl
listen
htonl
accept
select
__WSAFDIsSet
WSACleanup
WSASetLastError
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
socket
WSAGetLastError
send
recv
closesocket
ioctlsocket
WSAStartup
WSAIoctl
kernel32
QueryPerformanceFrequency
GetSystemDirectoryA
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryA
VerifyVersionInfoA
Sleep
CloseHandle
WaitForSingleObjectEx
SleepEx
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
CreateFileA
GetFileSizeEx
MultiByteToWideChar
InitializeCriticalSectionEx
DeleteCriticalSection
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetLastError
SetLastError
VerSetConditionMask
ExpandEnvironmentStringsA
FormatMessageA
EnterCriticalSection
LeaveCriticalSection
GetTickCount
WideCharToMultiByte
advapi32
CryptAcquireContextA
CryptGetHashParam
CryptGenRandom
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptImportKey
CryptEncrypt
CryptReleaseContext
crypt32
CertAddCertificateContextToStore
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
CertGetCertificateChain
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertFreeCertificateChain
wldap32
ord217
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord46
ord143
ord22
ord41
ord50
ord45
ord60
ord211
normaliz
IdnToAscii
Exports
Exports
eddie_curl
eddie_get_interface_metric
eddie_init
Sections
.text Size: 381KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
piezometre/system-reboot-symbolic.svg
-
vmxnet3.sys.html