Behavioral task
behavioral1
Sample
9ef9e29a93154b3c7c87191972f20f44_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
9ef9e29a93154b3c7c87191972f20f44_JaffaCakes118
-
Size
455KB
-
MD5
9ef9e29a93154b3c7c87191972f20f44
-
SHA1
21e9361f341c552baaba6fea8e9a63e87a591148
-
SHA256
92c1617d281a547fb7dc3e086f27d268d6cb09d1477ea5087e39eb164d451d62
-
SHA512
93cf0776ea78abc5c864e317016cef84b12558adb6bcca174ec8081d507db7fc0e7dddfae4e618811c0158bdbe70d805afd6a0cf5fee834fd27cdb8dc86b1a4b
-
SSDEEP
12288:pTOnjV+iILZRqTPljGeZNb19En63N9020WK4AvrXYZ:y0DQjZ0YKY
Malware Config
Extracted
socelars
http://www.frivoloument.com/index.php/
Signatures
Files
-
9ef9e29a93154b3c7c87191972f20f44_JaffaCakes118.exe windows:6 windows x86 arch:x86
Code Sign
13:99:8b:94:80:8c:01:75:b9:4c:67:ff:89:8e:45:bfCertificate
IssuerCN=Microsoft CorporationNot Before26-12-2018 02:28Not After31-12-2039 23:59SubjectCN=Microsoft Corporation25:1f:5d:98:81:82:17:2e:3c:41:9e:01:4f:b0:40:4cCertificate
IssuerCN=Certification Authority of WoSign,O=WoSign CA Limited,C=CNNot Before08-08-2009 01:00Not After08-08-2024 01:00SubjectCN=WoSign Time Stamping Signer,O=WoSign CA Limited,C=CNExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
5e:68:d6:11:71:94:63:50:56:00:68:f3:3e:c9:c5:91Certificate
IssuerCN=Certification Authority of WoSign,O=WoSign CA Limited,C=CNNot Before08-08-2009 01:00Not After08-08-2039 01:00SubjectCN=Certification Authority of WoSign,O=WoSign CA Limited,C=CNKey Usages
KeyUsageCertSign
KeyUsageCRLSign
b2:ce:de:4f:10:c2:7d:65:e7:8e:1f:0c:fe:7f:35:22:c3:12:a0:3bSigner
Actual PE Digestb2:ce:de:4f:10:c2:7d:65:e7:8e:1f:0c:fe:7f:35:22:c3:12:a0:3bDigest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 624KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 445KB - Virtual size: 448KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 840KB - Virtual size: 840KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zzzstuc Size: 512B - Virtual size: 138B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zzzstuc Size: 1024B - Virtual size: 634B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.protect Size: 512B - Virtual size: 403B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dududu1 Size: 1024B - Virtual size: 675B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dgdg44 Size: 512B - Virtual size: 42B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dgdg22 Size: 512B - Virtual size: 121B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dugdug3 Size: 1024B - Virtual size: 774B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.daada33 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dadaa11 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ddada22 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ