Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_94eb247a0c3228ce5398957bab703ce427167a568b29f0782c3197ea919c2b1c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_94eb247a0c3228ce5398957bab703ce427167a568b29f0782c3197ea919c2b1c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_94eb247a0c3228ce5398957bab703ce427167a568b29f0782c3197ea919c2b1c
-
Size
4.4MB
-
MD5
eb7cfac5e2f5285435267e6f03d0b836
-
SHA1
55fc25d12abdce16676f4068c9b8fe7deacb3a03
-
SHA256
94eb247a0c3228ce5398957bab703ce427167a568b29f0782c3197ea919c2b1c
-
SHA512
895afa7c76ae61fe9355cccefff03ac5a7007522d8340e430ba05fb8a110cf42de5b51988fb6987e7230864dacf32097075baf40640db26db2c35df9b894d715
-
SSDEEP
98304:vjdQLpHkdgWYP9To1fnbgK9gACnRuFHR4Dm+OgvPzz9E:ChxWQ9K8jtu4jH2
Malware Config
Signatures
Files
-
JaffaCakes118_94eb247a0c3228ce5398957bab703ce427167a568b29f0782c3197ea919c2b1c.exe windows:5 windows x86 arch:x86
ecda7b3fe7f3df133ca77cddd8e4064d
Code Sign
87:71:d7:59:f6:d9:3b:43:ce:2f:45:83:61:50:52:11Certificate
IssuerPOSTALCODE=10188Not Before03/09/2021, 04:03Not After03/09/2022, 04:03SubjectPOSTALCODE=1018841:a4:c5:5d:ca:bf:99:0a:ac:64:e1:d6:56:7d:8e:fb:1f:f1:c5:ef:21:ef:fe:fc:3b:5a:59:be:80:06:86:a3Signer
Actual PE Digest41:a4:c5:5d:ca:bf:99:0a:ac:64:e1:d6:56:7d:8e:fb:1f:f1:c5:ef:21:ef:fe:fc:3b:5a:59:be:80:06:86:a3Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\kivexolen\semi 27\wix_nebuxanimale gizizipokis\fom.pdb
Imports
kernel32
SetLocalTime
InterlockedIncrement
ReadConsoleA
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetEnvironmentStringsW
GetUserDefaultLCID
AddConsoleAliasW
SetVolumeMountPointW
EnumCalendarInfoExW
WriteFile
GetUserDefaultLangID
GetEnvironmentStrings
WriteConsoleOutputA
LeaveCriticalSection
lstrcpynW
FindNextVolumeW
VerifyVersionInfoA
GetModuleFileNameW
GetACP
GetConsoleOutputCP
GetProcAddress
PeekConsoleInputW
GetComputerNameExW
VerLanguageNameA
CreateTimerQueueTimer
HeapUnlock
LocalAlloc
GetDefaultCommConfigA
GetModuleHandleA
QueueUserWorkItem
HeapSetInformation
GetConsoleTitleW
ReadConsoleInputW
GlobalReAlloc
LCMapStringW
PulseEvent
GetCommandLineW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
GetLastError
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
EnterCriticalSection
TerminateProcess
IsDebuggerPresent
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
SetFilePointer
FreeEnvironmentStringsW
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RtlUnwind
HeapAlloc
HeapReAlloc
VirtualAlloc
WideCharToMultiByte
SetStdHandle
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CloseHandle
WriteConsoleA
WriteConsoleW
CreateFileA
user32
RealGetWindowClassW
gdi32
GetCharWidthFloatA
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 29.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ