C:\notabaledutemacefaw-xedaweyahodasazimay-jagowarabov_m.pdb
Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_34c46c275c84f9c8aa05c3399a1ee9bc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_34c46c275c84f9c8aa05c3399a1ee9bc.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_34c46c275c84f9c8aa05c3399a1ee9bc
-
Size
14.5MB
-
MD5
34c46c275c84f9c8aa05c3399a1ee9bc
-
SHA1
995251cca3838fb9a19ec7bdc2826e6b05dfa503
-
SHA256
3a0c699dfd2818026b2685be853b6e4470501d8ea9c7126af16c6f3c62e8ccd7
-
SHA512
a308a2dd4975dc2c41e8c8cb12af1a539b43997c150ebfb6fa0ef2e658127380c44c86b9e09878948730ecc4546f10957286de67251e45a876e003924d87ed3f
-
SSDEEP
3072:p0dYxvqagQYPbb1gFlSLMU+++++++++++++++++++++++++++++++++++++++++m:+dYrYP1gjSI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_34c46c275c84f9c8aa05c3399a1ee9bc
Files
-
JaffaCakes118_34c46c275c84f9c8aa05c3399a1ee9bc.exe windows:5 windows x86 arch:x86
a5fe9130cb8c03feb16b313b38bf84dd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetTickCount
GetProcessHeap
GetConsoleMode
GetCalendarInfoA
CreateEventA
WriteConsoleW
TerminateProcess
lstrcatA
GetACP
GetStringTypeExA
GetProcAddress
LoadLibraryA
LocalAlloc
TransmitCommChar
QueryDosDeviceW
SetProcessWorkingSetSize
WaitForMultipleObjects
_lread
UpdateResourceW
PurgeComm
DeleteFileW
FindActCtxSectionStringW
InterlockedPushEntrySList
SetEvent
ReadConsoleOutputAttribute
SetDefaultCommConfigW
LoadResource
SetEndOfFile
EnumDateFormatsExW
FindFirstChangeNotificationW
GetNumaNodeProcessorMask
RegisterWaitForSingleObject
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetLastError
HeapFree
EncodePointer
TlsGetValue
TlsSetValue
DecodePointer
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetOEMCP
IsValidCodePage
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
RtlUnwind
HeapAlloc
LoadLibraryW
advapi32
AccessCheckByTypeResultList
AddAuditAccessAce
DestroyPrivateObjectSecurity
Exports
Exports
@Sticky@16
@Tea@16
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.loniri Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14.4MB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ