Static task
static1
Behavioral task
behavioral1
Sample
8dc52ddae6023bdda997714aee7fb3db_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8dc52ddae6023bdda997714aee7fb3db_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
8dc52ddae6023bdda997714aee7fb3db_JaffaCakes118
-
Size
2.1MB
-
MD5
8dc52ddae6023bdda997714aee7fb3db
-
SHA1
f7d1e07cbf78fc2b371592134da9c289f0332330
-
SHA256
eb9d1f4a514b77fe13cb2edd4729e045a45b1578b09ba18373ebb6f6393df913
-
SHA512
f4196670ca183c3f049f32def1385cbf8d0d18b9055f220cfa70f70be84671825a1f95f90b031cdfd7d6acd125bbe6e635ebfb40f5acfc3ca7abd947c5f4ba73
-
SSDEEP
49152:3+8euGnqB/cb4WoTAa8Zonjpy5aoSKrBda7r:2uGQ/cblyuBda7r
Malware Config
Signatures
Files
-
8dc52ddae6023bdda997714aee7fb3db_JaffaCakes118.exe windows:5 windows x86 arch:x86
14ccbfc834a17178d15bc1e823efccf1
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US7e:93:eb:fb:7c:c6:4e:59:ea:4b:9a:77:d4:06:fc:3bCertificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before21/12/2012, 00:00Not After30/12/2020, 23:59SubjectCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
0e:cf:f4:38:c8:fe:bf:35:6e:04:d8:6a:98:1b:1a:50Certificate
IssuerCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USNot Before18/10/2012, 00:00Not After29/12/2020, 23:59SubjectCN=Symantec Time Stamping Services Signer - G4,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
25:0c:e8:e0:30:61:2e:9f:2b:89:f7:05:4d:7c:f8:fdCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before08/11/2006, 00:00Not After07/11/2021, 23:59SubjectCN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
59:b9:5d:55:8c:2d:cc:52:35:72:e3:f8:f9:a5:f7:9dCertificate
IssuerCN=VeriSign Class 3 Code Signing 2010 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)10,O=VeriSign\, Inc.,C=USNot Before25/06/2012, 00:00Not After24/08/2015, 23:59SubjectCN=Sogou.com,OU=Digital ID Class 3 - Microsoft Software Validation v2+OU=Desktop,O=Sogou.com,L=Beijing,ST=Beijing,C=CNExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
52:00:e5:aa:25:56:fc:1a:86:ed:96:c9:d4:4b:33:c7Certificate
IssuerCN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before08/02/2010, 00:00Not After07/02/2020, 23:59SubjectCN=VeriSign Class 3 Code Signing 2010 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)10,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
e:\project\sogouime\branch\PinyinDev_R_7_5\Bin\SogouPdb\SogouInput\PinyinUp.pdb
Imports
wininet
InternetSetOptionW
InternetOpenUrlW
InternetCloseHandle
InternetOpenW
InternetSetCookieW
comctl32
InitCommonControlsEx
shlwapi
StrToIntW
StrStrIW
SHGetValueW
SHDeleteKeyA
StrCmpIW
ws2_32
__WSAFDIsSet
listen
accept
recvfrom
sendto
WSASetLastError
getservbyport
gethostbyaddr
getservbyname
ioctlsocket
inet_addr
socket
connect
setsockopt
getpeername
getsockopt
htons
bind
ntohs
getsockname
send
recv
WSAGetLastError
closesocket
WSACleanup
select
WSAStartup
gethostbyname
gethostname
inet_ntoa
htonl
kernel32
ResetEvent
WaitForMultipleObjects
FileTimeToLocalFileTime
FindResourceW
FreeLibrary
LoadResource
LoadLibraryExW
SizeofResource
lstrcmpiW
MulDiv
OpenEventW
GetCurrentDirectoryA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
GetStringTypeA
LCMapStringA
GetConsoleMode
GetConsoleCP
GetStartupInfoA
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
HeapSize
HeapDestroy
HeapCreate
GetFileInformationByHandle
FindFirstFileA
GetDriveTypeA
GetTimeZoneInformation
RtlUnwind
GetDriveTypeW
GetStartupInfoW
GetCPInfo
ExitProcess
GetFullPathNameW
UnhandledExceptionFilter
FormatMessageA
ExpandEnvironmentStringsA
GetStdHandle
GetFileType
PeekNamedPipe
SleepEx
WaitForSingleObjectEx
TlsFree
TlsAlloc
GetModuleFileNameW
TlsGetValue
InitializeCriticalSectionAndSpinCount
OpenMutexW
QueryDosDeviceW
GetLogicalDriveStringsW
OpenFileMappingW
FileTimeToSystemTime
GetProcessId
GetFileAttributesW
CopyFileW
MoveFileExW
FlushFileBuffers
IsDebuggerPresent
lstrcatW
TerminateProcess
FormatMessageW
SetUnhandledExceptionFilter
InitializeCriticalSection
VirtualQuery
CopyFileA
lstrcatA
GetSystemDirectoryA
lstrcpyA
CreateFileA
OpenProcess
DeviceIoControl
LocalAlloc
GetFileSize
RemoveDirectoryW
SetEvent
GlobalMemoryStatusEx
SetFileAttributesW
SuspendThread
GetCurrentProcessId
CreateEventW
GetExitCodeProcess
WaitForSingleObject
SetErrorMode
DeleteFileW
ReadFile
GetTempFileNameW
ResumeThread
GetCurrentThreadId
DeleteCriticalSection
EnterCriticalSection
InterlockedExchange
RaiseException
FlushInstructionCache
lstrcpynW
LeaveCriticalSection
lstrcpyW
DebugBreak
FindNextFileW
CreateFileMappingW
FindClose
GetTempPathW
MultiByteToWideChar
CreateFileW
Sleep
WriteFile
OutputDebugStringW
GetFileAttributesExW
InterlockedIncrement
lstrlenA
SetFilePointer
FindFirstFileW
LocalFree
CloseHandle
GetModuleHandleW
GetCurrentProcess
InterlockedDecrement
CreateMutexW
CreateDirectoryW
VirtualProtect
VirtualFree
LoadLibraryA
VirtualAlloc
GetCommandLineW
lstrlenW
WideCharToMultiByte
GetSystemDirectoryW
GetModuleFileNameA
ReleaseMutex
UnmapViewOfFile
MapViewOfFile
IsBadReadPtr
DuplicateHandle
ExitThread
CreateThread
GetSystemTimeAsFileTime
GetVersionExW
SetNamedPipeHandleState
GlobalFree
SetLastError
GlobalAlloc
GetTickCount
GetProcAddress
LoadLibraryW
GetProcessHeap
HeapFree
HeapAlloc
HeapReAlloc
GetLocalTime
GetLastError
GetModuleHandleA
GetFullPathNameA
SetStdHandle
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CreateProcessW
lstrcpynA
WriteConsoleA
TlsSetValue
WaitNamedPipeW
CreateIoCompletionPort
TransactNamedPipe
InterlockedCompareExchange
GetQueuedCompletionStatus
QueryPerformanceFrequency
LCMapStringW
QueryPerformanceCounter
WriteConsoleW
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
IsProcessorFeaturePresent
GetConsoleOutputCP
user32
UnregisterClassA
SetRectEmpty
IsCharAlphaNumericW
FillRect
GetParent
EnableWindow
DestroyWindow
GetMessageW
LoadImageW
wsprintfW
GetDC
TranslateMessage
LoadAcceleratorsW
LoadMenuW
ReleaseDC
GetDlgItem
DispatchMessageW
EndPaint
SetCursor
TranslateAcceleratorW
GetSystemMenu
SetTimer
GetWindowRect
MonitorFromPoint
PostQuitMessage
DrawTextW
KillTimer
LoadStringA
DialogBoxParamW
LoadCursorW
MessageBeep
SubtractRect
DrawIcon
GetClientRect
SetFocus
GetMenuItemInfoW
BeginPaint
PtInRect
GetClassInfoExW
RegisterClassExW
LoadIconW
TrackPopupMenuEx
IntersectRect
InvalidateRect
GetWindowLongW
AppendMenuW
GetWindowTextW
SetClassLongW
PeekMessageW
EnableMenuItem
SetWindowLongW
EndDialog
SetWindowPos
ShowWindow
CreatePopupMenu
LoadBitmapW
GetMenuItemCount
IsWindow
RemoveMenu
CreateWindowExW
SetMenuDefaultItem
MapWindowPoints
UpdateWindow
DestroyMenu
SetWindowTextW
DestroyIcon
SetMenuItemInfoW
GetMonitorInfoW
CallWindowProcW
DefWindowProcW
CopyRect
MoveWindow
CharNextW
wvsprintfW
FindWindowW
SendMessageW
LoadStringW
MessageBoxW
GetSystemMetrics
wsprintfA
PostMessageW
gdi32
GetDeviceCaps
GetTextMetricsW
DPtoLP
CreateSolidBrush
MoveToEx
LineTo
SetTextColor
CreateFontIndirectW
SetBkMode
DeleteObject
SelectObject
CreatePen
advapi32
RegDeleteKeyW
RegNotifyChangeKeyValue
RegEnumValueA
RegDeleteValueA
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyW
CryptAcquireContextW
CryptImportKey
CryptSetKeyParam
CryptEncrypt
CryptDestroyKey
CryptReleaseContext
CryptDecrypt
CryptGetKeyParam
SetNamedSecurityInfoW
GetNamedSecurityInfoW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
GetSecurityDescriptorSacl
BuildExplicitAccessWithNameW
AddAccessAllowedAceEx
InitializeAcl
GetLengthSid
SetSecurityDescriptorSacl
RegEnumKeyExW
RegDeleteValueW
RegQueryInfoKeyW
RegOpenKeyW
RegSetValueExW
RegCreateKeyExW
FreeSid
AllocateAndInitializeSid
LookupAccountSidW
EqualSid
GetTokenInformation
OpenProcessToken
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExA
shell32
ShellExecuteW
ShellExecuteExW
Shell_NotifyIconW
SHGetFolderPathW
SHFileOperationW
CommandLineToArgvW
ole32
CoUninitialize
CoCreateInstance
CoInitializeEx
CoInitialize
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
oleaut32
SysStringLen
VariantInit
VarUI4FromStr
SysFreeString
SysAllocString
imm32
ImmDisableIME
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
wldap32
ord41
ord27
ord301
ord22
ord211
ord143
ord60
ord50
ord26
ord30
ord32
ord35
ord79
ord200
ord33
ord46
Sections
.text Size: 897KB - Virtual size: 897KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 437KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 731KB - Virtual size: 731KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ