Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_76292ec163591beb993ea1b6ff9518e2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_76292ec163591beb993ea1b6ff9518e2.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_76292ec163591beb993ea1b6ff9518e2
-
Size
183KB
-
MD5
76292ec163591beb993ea1b6ff9518e2
-
SHA1
293bfbed8cd5639c6bb705ed96f6cddd4370bd5d
-
SHA256
0ff8b19635e74795f89635e81c8478a3f1a08c7b7a2c0dd842b218b7c9755941
-
SHA512
25bd43e9a3f0764fb6b0b0ec45c2f2c1976cc21f269f020ccccc8f26d32cda2f531f11ea250ab79c1d1fd11902c0e5fbb2aeb7f60fe404012bc5652cb090a1e3
-
SSDEEP
3072:HlV+x57RtcT6sQ9QnpQxYNj6oLq2RhwU20So2QX6Za8BTLzV8TeAjEJeJHo:FVS57DxsQYQxYNusqDo2QqzBT/V8efcI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_76292ec163591beb993ea1b6ff9518e2
Files
-
JaffaCakes118_76292ec163591beb993ea1b6ff9518e2.exe windows:4 windows x86 arch:x86
f36221c55e1c9bac642eaeb1193095d1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCalendarInfoA
HeapAlloc
SizeofResource
GetProcessHeap
LoadLibraryW
SystemTimeToFileTime
GetStdHandle
LoadLibraryExW
GetSystemTime
LoadResource
FindResourceExA
EnumResourceNamesA
HeapDestroy
CloseHandle
FindFirstFileW
HeapFree
CreateFileW
lstrcpynW
LockResource
FindResourceA
GetModuleHandleA
GetVersionExA
WriteFile
LeaveCriticalSection
TerminateProcess
ole32
CoGetMalloc
CoTaskMemFree
ProgIDFromCLSID
StringFromCLSID
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ