Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7df7747d28b6d2e4e9eff7cdb9b9a685.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7df7747d28b6d2e4e9eff7cdb9b9a685.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_7df7747d28b6d2e4e9eff7cdb9b9a685
-
Size
259KB
-
MD5
7df7747d28b6d2e4e9eff7cdb9b9a685
-
SHA1
263ac5f22b3daaec6feee407985e68f9a73a3284
-
SHA256
0ffa7cd4fedad863031dad1c98c941e6900a43146e914f292b75fe201bc41b02
-
SHA512
1381b04daef4342c2f2032031064b5cf44c2dee7cc746052469098b734e14fd5778fe5b7fb06e4a073fcd79acaded3d9a35fcae871c5ddfc30c4f1048fec423f
-
SSDEEP
6144:XNtJIZHTutDjIzebMsoM0xiXqVL5+IuwHpuXNjUl3w:jK+Dczebnd0AXqVd+IZwjUW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_7df7747d28b6d2e4e9eff7cdb9b9a685
Files
-
JaffaCakes118_7df7747d28b6d2e4e9eff7cdb9b9a685.exe .js windows:4 windows x86 arch:x86 polyglot
be0347c9d016da86a19fe9ba1649175f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoCreateInstance
kernel32
HeapReAlloc
GetOverlappedResult
CreateEventW
EnterCriticalSection
CloseHandle
FindResourceExW
GetSystemInfo
GetFileSize
UnregisterWaitEx
ResumeThread
LockResource
HeapDestroy
UnhandledExceptionFilter
WaitForSingleObjectEx
LoadResource
GetThreadContext
SetNamedPipeHandleState
GetModuleHandleW
VirtualFree
HeapFree
TlsGetValue
SuspendThread
GetSystemTimeAsFileTime
CancelIo
CreateWaitableTimerW
RaiseException
HeapSize
SizeofResource
SetThreadPriority
TlsSetValue
GetCurrentThreadId
OutputDebugStringA
OpenThread
FindResourceW
GetTimeZoneInformation
GetStdHandle
IsDebuggerPresent
SetWaitableTimer
WriteFile
RtlCaptureContext
GetProcessHeap
CreateFileW
GetFileType
GetThreadTimes
ReadFile
ReleaseSemaphore
VirtualAlloc
LeaveCriticalSection
RegisterWaitForSingleObject
CancelWaitableTimer
DeleteCriticalSection
HeapAlloc
CreateSemaphoreA
TlsAlloc
GetCommandLineW
lstrlenA
WaitForSingleObject
SetUnhandledExceptionFilter
VirtualAllocEx
GetModuleHandleA
winmm
timeGetTime
user32
MessageBoxW
oleaut32
VariantClear
SysFreeString
SysAllocString
VariantInit
advapi32
RegEnumKeyW
RegOpenKeyExW
TraceMessage
GetTraceEnableLevel
RegQueryValueExW
GetTraceLoggerHandle
RegEnumValueW
UnregisterTraceGuids
RegCloseKey
RegQueryInfoKeyW
RegisterTraceGuidsW
GetTraceEnableFlags
ControlTraceW
shlwapi
PathAddBackslashW
winspool.drv
DocumentEvent
GetPrinterDriverDirectoryA
SplDriverUnloadComplete
GetPrinterDriverA
DocumentPropertiesA
EndDocPrinter
SetDefaultPrinterA
GetPrintProcessorDirectoryW
AddPortExA
FlushPrinter
DeletePrinterDataExW
StartDocPrinterW
softpub
SoftpubDefCertInit
DllUnregisterServer
OpenPersonalTrustDBDialog
Sections
.LPfxR Size: 512B - Virtual size: 15KB
IMAGE_SCN_MEM_READ
.eJCh Size: 2KB - Virtual size: 24KB
IMAGE_SCN_MEM_READ
.lrHXO Size: 512B - Virtual size: 21KB
IMAGE_SCN_MEM_READ
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.qVBxg Size: 1024B - Virtual size: 759B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.YpaQGG Size: 512B - Virtual size: 463B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.EPUG Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Kkqg Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CKOc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 208KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hkSR Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.FLjQRU Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.BiSHzYR Size: 1024B - Virtual size: 783B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ