wextract.pdb
Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_64faf7f0def69d994bf0e5c5a0358d49.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_64faf7f0def69d994bf0e5c5a0358d49.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_64faf7f0def69d994bf0e5c5a0358d49
-
Size
1.5MB
-
MD5
64faf7f0def69d994bf0e5c5a0358d49
-
SHA1
e0c7a65dff26c70d02e5880c1b931fd5faf39f10
-
SHA256
d71b135996dadb5f83321c26562bda351aae22c2425970747d3b5631e7cbb08c
-
SHA512
c7494a3ce4164ed36e42a2301d5575d20fa42b99bd828648deaeaf0514681f98419c86570cada538f01280a5ae6b3c7a89677f39cb730b620acee606f523a7de
-
SSDEEP
49152:VefQxfVKFD3sIIMy+qlhKRe0qnwwT/E+Yzyu:QIVEcUReoxTd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_64faf7f0def69d994bf0e5c5a0358d49
Files
-
JaffaCakes118_64faf7f0def69d994bf0e5c5a0358d49.exe windows:5 windows x86 arch:x86
1ed031f7b768777c0b9e4bb9aa1f56bd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcpyA
_lclose
_llseek
_lopen
WritePrivateProfileStringA
GetWindowsDirectoryA
CreateDirectoryA
GetFileAttributesA
ExpandEnvironmentStringsA
IsDBCSLeadByte
GetShortPathNameA
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcmpiA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
FreeResource
LockResource
LoadResource
SizeofResource
FindResourceA
ReadFile
WriteFile
SetFilePointer
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetCurrentDirectoryA
GetTempFileNameA
ExitProcess
lstrcmpA
LoadLibraryExA
lstrcpynA
GetVolumeInformationA
FormatMessageA
GetCurrentDirectoryA
lstrcatA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetTempPathA
GetSystemInfo
CreateMutexA
SetEvent
CreateEventA
CreateThread
ResetEvent
TerminateThread
GetDriveTypeA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetFileAttributesA
DeleteFileA
FindNextFileA
FindClose
RemoveDirectoryA
GetSystemDirectoryA
lstrlenA
GetModuleFileNameA
GetCurrentProcess
GetLastError
LocalAlloc
LocalFree
CloseHandle
LoadLibraryA
GetProcAddress
GetVersionExA
FindFirstFileA
GetDiskFreeSpaceA
MulDiv
EnumResourceLanguagesA
CreateFileA
FreeLibrary
advapi32
RegCloseKey
RegQueryInfoKeyA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
FreeSid
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
GetTokenInformation
EqualSid
AllocateAndInitializeSid
gdi32
GetDeviceCaps
user32
ExitWindowsEx
wsprintfA
CharNextA
CharUpperA
CharPrevA
SetWindowLongA
GetWindowLongA
CallWindowProcA
DispatchMessageA
MsgWaitForMultipleObjects
PeekMessageA
SendMessageA
SetWindowPos
ReleaseDC
GetDC
GetWindowRect
SendDlgItemMessageA
GetDlgItem
SetForegroundWindow
SetWindowTextA
MessageBoxA
DialogBoxIndirectParamA
ShowWindow
EnableWindow
GetDlgItemTextA
EndDialog
GetDesktopWindow
MessageBeep
SetDlgItemTextA
LoadStringA
GetSystemMetrics
comctl32
ord17
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ