Static task
static1
Behavioral task
behavioral1
Sample
4e3218f11eff65b221e3e053ff3956ab_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4e3218f11eff65b221e3e053ff3956ab_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4e3218f11eff65b221e3e053ff3956ab_JaffaCakes118
-
Size
2.0MB
-
MD5
4e3218f11eff65b221e3e053ff3956ab
-
SHA1
85af52028aebdadbdafe3246fc41f12ddbd0b4d1
-
SHA256
0362b416c85f103ce616981f0adcfddc1815baa7a53c48a54d452b9253c44040
-
SHA512
09dd3836ca9f59ceb068d7bcdd149fa51e95597bebfb04afb17f106e3c0f1795a71fac09f79196602137512cb9375d7bd002b21c088b0722b13f7acec4b58ee5
-
SSDEEP
49152:S8VgfW8JPYWyu/DzOi48u+McPyRsug1NbLMWIfAazKJ2qZqNS:S8VgfW87DDa78u2PyKug1NfLIrzKnZq
Malware Config
Signatures
Files
-
4e3218f11eff65b221e3e053ff3956ab_JaffaCakes118.exe windows:5 windows x86 arch:x86
bbf64975c90ef96d7493f4acce820003
Code Sign
4e:bb:dd:1f:16:15:2c:56:bc:c1:f8:a1:2c:d7:8c:adCertificate
IssuerCN=greenfish CANot Before13/01/2018, 13:49Not After31/12/2039, 23:59SubjectCN=greenfish CA7e:93:eb:fb:7c:c6:4e:59:ea:4b:9a:77:d4:06:fc:3bCertificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before21/12/2012, 00:00Not After30/12/2020, 23:59SubjectCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
0e:cf:f4:38:c8:fe:bf:35:6e:04:d8:6a:98:1b:1a:50Certificate
IssuerCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USNot Before18/10/2012, 00:00Not After29/12/2020, 23:59SubjectCN=Symantec Time Stamping Services Signer - G4,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
87:16:27:47:93:fb:47:27:a5:49:4a:8a:bc:6d:2e:3c:77:7e:7f:3bSigner
Actual PE Digest87:16:27:47:93:fb:47:27:a5:49:4a:8a:bc:6d:2e:3c:77:7e:7f:3bDigest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
getpeername
getsockname
closesocket
select
send
recv
htons
ioctlsocket
setsockopt
socket
connect
WSAStartup
kernel32
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetACP
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTimeZoneInformation
GetDriveTypeA
InitializeCriticalSectionAndSpinCount
CompareStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
SetEnvironmentVariableA
GetStdHandle
SetHandleCount
GetConsoleMode
GetConsoleCP
GetFileType
SetStdHandle
HeapSize
ExitProcess
HeapReAlloc
VirtualQuery
VirtualAlloc
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
CreateThread
ExitThread
GetSystemTimeAsFileTime
CreateDirectoryA
RaiseException
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
FindResourceExA
VirtualProtect
GetFileTime
GetFileSizeEx
GetProfileIntA
GetTickCount
SearchPathA
GetTempPathA
GetTempFileNameA
SetErrorMode
GetOEMCP
GetCPInfo
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetFileSize
GlobalFlags
GetCurrentDirectoryA
GetThreadLocale
InterlockedIncrement
GetModuleHandleW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
LCMapStringA
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetCurrentProcessId
GlobalAddAtomA
ResumeThread
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
GlobalFree
CopyFileA
GlobalSize
FormatMessageA
lstrlenW
MultiByteToWideChar
MulDiv
lstrlenA
SetLastError
FileTimeToLocalFileTime
FileTimeToSystemTime
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WideCharToMultiByte
LocalFree
FindFirstFileA
GetFileAttributesA
FindNextFileA
FindClose
CreateProcessA
GetExitCodeProcess
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalLock
GlobalUnlock
FreeResource
DeleteFileA
RemoveDirectoryA
GetModuleFileNameA
DeleteVolumeMountPointA
FindFirstVolumeA
QueryDosDeviceA
FindNextVolumeA
FindVolumeClose
GetVolumePathNamesForVolumeNameA
GetVersionExA
CreateRemoteThread
WaitForSingleObject
Module32First
Module32Next
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
Sleep
GetLastError
GetCurrentProcess
lstrcmpiA
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32First
CloseHandle
Process32Next
GetSystemTime
GetModuleHandleA
GetProcAddress
GetSystemInfo
GetWindowsDirectoryA
SetFileAttributesA
lstrcpyA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetStringTypeW
GetStringTypeA
TlsAlloc
IsValidCodePage
GetEnvironmentStringsW
user32
IsClipboardFormatAvailable
MapVirtualKeyExA
GetKeyNameTextA
IsCharLowerA
GetMenuDefaultItem
SetMenuDefaultItem
UpdateLayeredWindow
EnableScrollBar
UnionRect
SetCursorPos
DrawIconEx
DrawFocusRect
DrawFrameControl
DrawEdge
UnpackDDElParam
ReuseDDElParam
InsertMenuItemA
TranslateAcceleratorA
UnregisterClassA
GetNextDlgGroupItem
InvalidateRgn
CharNextA
EmptyClipboard
CloseClipboard
SetClipboardData
LoadImageA
DestroyIcon
CopyImage
OpenClipboard
DrawStateA
RegisterClipboardFormatA
EnumChildWindows
LockWindowUpdate
BringWindowToTop
IsRectEmpty
InvalidateRect
IsMenu
SetClassLongA
SetParent
CreatePopupMenu
NotifyWinEvent
SetWindowRgn
CreateAcceleratorTableA
LoadAcceleratorsA
DestroyAcceleratorTable
GetAsyncKeyState
CharUpperA
GetKeyboardState
GetKeyboardLayout
MapVirtualKeyA
ToAsciiEx
CopyAcceleratorTableA
PostThreadMessageA
LoadMenuA
SetRectEmpty
WaitMessage
ReleaseCapture
WindowFromPoint
SetCapture
DeleteMenu
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
DestroyMenu
GetMenuItemInfoA
InflateRect
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
CheckDlgButton
RegisterWindowMessageA
SendDlgItemMessageA
IsChild
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
SetWindowPlacement
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
SetWindowLongA
IntersectRect
GetWindowPlacement
GetWindowRect
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
ShowOwnedPopups
SetCursor
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
WinHelpA
SystemParametersInfoA
OffsetRect
MessageBeep
RedrawWindow
DefFrameProcA
DefMDIChildProcA
DrawMenuBar
DestroyCursor
GetWindowRgn
CreateMenu
GetDoubleClickTime
GetIconInfo
IsZoomed
PostQuitMessage
GetMenuState
GetMenuStringA
GetMenuItemID
InsertMenuA
GetMenuItemCount
GetSubMenu
RemoveMenu
GetClientRect
IsIconic
SubtractRect
CopyIcon
CharUpperBuffA
GetUpdateRect
FrameRect
GetClassNameA
TranslateMDISysAccel
DrawIcon
GetSystemMetrics
SendMessageA
GetSystemMenu
AppendMenuA
LoadIconA
EnableWindow
GetWindowThreadProcessId
FindWindowA
GetParent
PostMessageA
GetWindow
MessageBoxA
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
KillTimer
wsprintfA
WaitForInputIdle
SetRect
gdi32
CreateRectRgnIndirect
OffsetRgn
GetRgnBox
CreateDIBitmap
CreateCompatibleBitmap
GetTextMetricsA
EnumFontFamiliesA
GetTextCharsetInfo
CreateRoundRectRgn
GetTextColor
SetDIBColorTable
PatBlt
GetDIBits
RealizePalette
PtVisible
CombineRgn
StretchBlt
SetPixel
CreateDIBSection
GetBkColor
SetRectRgn
GetMapMode
DPtoLP
CreateEllipticRgn
CreatePolygonRgn
Polyline
Ellipse
Polygon
Rectangle
RoundRect
CreateHatchBrush
GetPaletteEntries
GetWindowOrgEx
FillRgn
FrameRgn
GetBoundsRect
GetViewportOrgEx
LPtoDP
ExtFloodFill
SetPaletteEntries
GetNearestPaletteIndex
GetSystemPaletteEntries
EnumFontFamiliesExA
GetTextFaceA
SetPixelV
GetPixel
GetWindowExtEx
CreatePalette
CreateSolidBrush
GetViewportExtEx
CreateRectRgn
SelectClipRgn
CreatePen
GetObjectType
SelectPalette
GetStockObject
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
RestoreDC
SaveDC
GetTextExtentPoint32A
ExtTextOutA
BitBlt
CreateCompatibleDC
CreateFontIndirectA
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDCOrgEx
CreateBitmap
SetViewportOrgEx
SelectObject
Escape
TextOutA
CopyMetaFileA
PtInRegion
GetDeviceCaps
DeleteObject
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
SetMapMode
SetROP2
SetPolyFillMode
SetBkMode
RectVisible
msimg32
AlphaBlend
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
SetNamedSecurityInfoA
CryptDestroyHash
CryptDecrypt
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptAcquireContextA
CryptEncrypt
GetTokenInformation
OpenProcessToken
RegEnumKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
SetEntriesInAclA
CryptReleaseContext
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegQueryValueExA
LookupPrivilegeValueA
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
shell32
SHGetFileInfoA
ShellExecuteA
SHAppBarMessage
DragQueryFileA
DragFinish
ShellExecuteExA
SHBrowseForFolderA
SHGetPathFromIDListA
comctl32
InitCommonControlsEx
ImageList_GetIconSize
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathRemoveFileSpecW
ole32
OleLockRunning
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CreateStreamOnHGlobal
CoCreateInstance
CLSIDFromProgID
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
CoTaskMemFree
IsAccelerator
OleTranslateAccelerator
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CoInitializeEx
CoUninitialize
OleGetClipboard
DoDragDrop
OleFlushClipboard
OleIsCurrentClipboard
CoRegisterMessageFilter
CoRevokeClassObject
RevokeDragDrop
CoLockObjectExternal
RegisterDragDrop
CLSIDFromString
oleaut32
SafeArrayDestroy
VariantCopy
SysAllocStringByteLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysFreeString
SysStringLen
oledlg
ord8
urlmon
URLDownloadToFileA
gdiplus
GdipDrawImageI
GdipGetImageGraphicsContext
GdiplusShutdown
GdiplusStartup
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipFree
GdipCloneImage
imm32
ImmGetOpenStatus
ImmReleaseContext
ImmGetContext
winmm
PlaySoundA
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 273KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 349KB - Virtual size: 349KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ