Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8467b4191e887d73c5401bb882f9e6daaf26224843207f651b3431ee86eb6d77.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8467b4191e887d73c5401bb882f9e6daaf26224843207f651b3431ee86eb6d77.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8467b4191e887d73c5401bb882f9e6daaf26224843207f651b3431ee86eb6d77
-
Size
4.4MB
-
MD5
69785669c9beb0cbb4bb90a5f994ca1e
-
SHA1
92912e90bfdce43e76fb8f19eb59893d5275d274
-
SHA256
8467b4191e887d73c5401bb882f9e6daaf26224843207f651b3431ee86eb6d77
-
SHA512
ec87811e7a7b8988fe01432700f0dabb40f00a8f51b29666a579da4ad3dfb44d006ae884809c3a075cf59b1d851483dd8ba410d194da0dae6f559dd2064ae66a
-
SSDEEP
98304:90UN727vReIpKo8KBcFmtaV8p6ifRfpW7oJeQPAsZZOUW47:9ApKXKuFmYifR/3oQEUWe
Malware Config
Signatures
Files
-
JaffaCakes118_8467b4191e887d73c5401bb882f9e6daaf26224843207f651b3431ee86eb6d77.exe windows:5 windows x86 arch:x86
bafa6c1265d6e12ccec5d8ce52c0df70
Code Sign
b5:ea:78:92:67:a7:b3:9b:4e:18:a4:73:8b:52:6c:eaCertificate
IssuerPOSTALCODE=10051Not Before24/09/2021, 04:45Not After24/09/2022, 04:45SubjectPOSTALCODE=10051ba:c0:bd:ad:62:bd:d8:37:6c:83:e0:2e:e0:a0:ea:e0:4b:5a:fb:bd:1b:f6:3b:50:bc:77:80:08:0f:1b:8c:c8Signer
Actual PE Digestba:c0:bd:ad:62:bd:d8:37:6c:83:e0:2e:e0:a0:ea:e0:4b:5a:fb:bd:1b:f6:3b:50:bc:77:80:08:0f:1b:8c:c8Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\pugap\jepex.pdb
Imports
kernel32
GetThreadContext
SetLocalTime
FindResourceExW
InterlockedIncrement
GetQueuedCompletionStatus
InterlockedDecrement
UnlockFile
SetEvent
FreeEnvironmentStringsA
GetModuleHandleW
CreateNamedPipeW
GetConsoleAliasesLengthA
SetCommState
GetCommandLineA
GetPrivateProfileIntA
GetSystemDirectoryW
LoadLibraryW
GetConsoleAliasExesLengthW
HeapDestroy
CreateSemaphoreA
GetBinaryTypeA
TerminateProcess
lstrlenW
LCMapStringA
GetPrivateProfileIntW
InterlockedExchange
GetStartupInfoA
GetStdHandle
FreeLibraryAndExitThread
OpenMutexW
GetLastError
GetCurrentDirectoryW
GetThreadLocale
GetProcAddress
EnterCriticalSection
LoadLibraryA
LocalAlloc
WritePrivateProfileStringA
GetNumberFormatW
GetProfileStringA
SetThreadIdealProcessor
HeapWalk
FindAtomA
SetSystemTime
GlobalWire
GetModuleFileNameA
FindFirstChangeNotificationA
FindNextFileW
WriteProfileStringW
GetCPInfoExA
SetFileShortNameA
TlsAlloc
EnumResourceLanguagesW
UnregisterWaitEx
CopyFileExA
DeleteFileA
GetVolumeInformationW
LocalFileTimeToFileTime
EncodePointer
DecodePointer
HeapSetInformation
GetStartupInfoW
ExitProcess
HeapValidate
IsBadReadPtr
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsSetValue
TlsFree
SetLastError
HeapCreate
WriteFile
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
LeaveCriticalSection
RtlUnwind
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
SetFilePointer
GetConsoleCP
GetConsoleMode
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
MultiByteToWideChar
IsProcessorFeaturePresent
LCMapStringW
GetStringTypeW
SetStdHandle
CreateFileW
CloseHandle
FlushFileBuffers
RaiseException
Sections
.text Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.2MB - Virtual size: 43.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ