Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5b6c0106060b6b2db4d0525e264fb1abb7a7b0b87886d91f137aa934e8d5d9c2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5b6c0106060b6b2db4d0525e264fb1abb7a7b0b87886d91f137aa934e8d5d9c2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5b6c0106060b6b2db4d0525e264fb1abb7a7b0b87886d91f137aa934e8d5d9c2
-
Size
4.3MB
-
MD5
9658ec152c7a4f985ee6c1399cbfba22
-
SHA1
72213809037eb34a42788bdf75113a7033dda2ca
-
SHA256
5b6c0106060b6b2db4d0525e264fb1abb7a7b0b87886d91f137aa934e8d5d9c2
-
SHA512
5c7942f8215e6568d3fce0e0ea96af13e7bb29f049d073b22eb89622e63627bd9ec921d123bf50d49d064e2cdac4cce3a2c48501747575d7b754a85daad07858
-
SSDEEP
98304:QhSatMjv+aSUBJowe8/Hz2Z+Bdzsy2uVebx2v7LO2:QUatMrneYT2+dzTeb8v7R
Malware Config
Signatures
Files
-
JaffaCakes118_5b6c0106060b6b2db4d0525e264fb1abb7a7b0b87886d91f137aa934e8d5d9c2.exe windows:5 windows x86 arch:x86
35df0081a66dd5736a634c136f4b9626
Code Sign
3d:42:c9:a4:4f:fc:eb:6b:3f:47:9c:10:ed:f4:f4:11Certificate
IssuerPOSTALCODE=10188Not Before28/08/2021, 07:40Not After28/08/2022, 07:40SubjectPOSTALCODE=10188f2:43:b7:7b:21:32:82:08:dd:f9:91:81:bb:3b:68:92:db:63:d1:5a:18:4f:fb:81:3f:f3:72:08:41:d2:33:aeSigner
Actual PE Digestf2:43:b7:7b:21:32:82:08:dd:f9:91:81:bb:3b:68:92:db:63:d1:5a:18:4f:fb:81:3f:f3:72:08:41:d2:33:aeDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\suvavisowan100 vavofomonudiw\gifamikufe.pdb
Imports
kernel32
CreateTimerQueue
lstrlenA
GetConsoleAliasesLengthW
GetDefaultCommConfigW
HeapAlloc
_lwrite
InterlockedDecrement
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetUserDefaultLCID
SetConsoleScreenBufferSize
SetVolumeMountPointW
GetConsoleAliasesLengthA
GetCommandLineA
GetEnvironmentStrings
GetConsoleCP
ReadConsoleInputA
WriteConsoleOutputA
GetComputerNameExA
lstrcpynW
GetFileAttributesW
LocalReAlloc
WriteConsoleW
HeapQueryInformation
GetMailslotInfo
ReadFile
GetModuleFileNameW
GetVolumeNameForVolumeMountPointA
GetConsoleOutputCP
InterlockedExchange
ChangeTimerQueueTimer
SetLastError
GetProcAddress
PeekConsoleInputW
BeginUpdateResourceW
EnumDateFormatsExA
RemoveDirectoryA
EnterCriticalSection
ResetEvent
GetLocalTime
LoadLibraryA
OpenMutexA
IsWow64Process
GlobalGetAtomNameW
GetCurrentConsoleFont
GetOEMCP
GetModuleHandleA
GetConsoleTitleW
BuildCommDCBA
VirtualProtect
GetFileAttributesExW
SetCalendarInfoA
FindFirstVolumeA
ReleaseMutex
GetCurrentProcessId
GetConsoleProcessList
EnumCalendarInfoExA
GetTimeZoneInformation
GetSystemDefaultLangID
CreateFileA
SetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
ExitProcess
GetStartupInfoA
RaiseException
RtlUnwind
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
LeaveCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
IsValidCodePage
HeapSize
GetLocaleInfoA
GetConsoleMode
FlushFileBuffers
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
SetFilePointer
CloseHandle
WriteConsoleA
user32
RealGetWindowClassA
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ