Behavioral task
behavioral1
Sample
aa20dafcdf63916383f519508c115a9d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
aa20dafcdf63916383f519508c115a9d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
aa20dafcdf63916383f519508c115a9d_JaffaCakes118
-
Size
768KB
-
MD5
aa20dafcdf63916383f519508c115a9d
-
SHA1
2d4d0c31254671f525e0d5f59cdc3b83326467ff
-
SHA256
cf7be0da2da116f75ebf5c9e1c41f2c4c16a5e5e64a051d7f15e9508ada524f1
-
SHA512
6709323b7742181c78d7b8029922ceb0a7fbc2eb48d64f2a4c61f29d1028053099cdcadc406fd69497e9a1df0f45ab9ca54c599e7acb8302ac038e16dee4140a
-
SSDEEP
12288:yo21ELnQ7Xp9ap6R7X875sZtp3mGc2kOe:kXjPs9sZtp3mX
Malware Config
Extracted
pony
http://onlygoodman.com/hjs/gate.php
-
payload_url
http://onlygoodman.com/hjs/hjs.exe
Signatures
-
Pony family
Files
-
aa20dafcdf63916383f519508c115a9d_JaffaCakes118.exe windows:4 windows x86 arch:x86
be90d6a975f9ecb77b6bc81d0d407efa
Code Sign
01Certificate
IssuerCN=Corporation. All B. V. 2011,O=MAGIX Beepa,C=AUNot Before20-11-2018 09:25Not After19-11-2021 09:25SubjectCN=Corporation. All B. V. 2011,O=MAGIX Beepa,C=AU4e:b0:87:8f:cc:24:35:36:b2:d8:c9:f7:bf:39:55:77Certificate
IssuerCN=UTN-USERFirst-Object,OU=http://www.usertrust.com,O=The USERTRUST Network,L=Salt Lake City,ST=UT,C=USNot Before31-12-2015 00:00Not After09-07-2019 18:40SubjectCN=COMODO SHA-256 Time Stamping Signer,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
c3:54:b2:ef:cf:42:67:71:4b:c7:fe:01:71:d6:39:76:18:2f:88:ef:a1:1d:ff:77:bd:a0:70:36:fb:4e:02:faSigner
Actual PE Digestc3:54:b2:ef:cf:42:67:71:4b:c7:fe:01:71:d6:39:76:18:2f:88:ef:a1:1d:ff:77:bd:a0:70:36:fb:4e:02:faDigest Algorithmsha256PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaVarSub
__vbaStrI2
_CIcos
_adj_fptan
__vbaVarMove
ord693
__vbaFreeVar
__vbaCyMul
__vbaStrVarMove
__vbaLenBstr
__vbaFreeVarList
_adj_fdiv_m64
ord698
_adj_fprem1
__vbaStrCat
ord660
__vbaSetSystemError
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaAryDestruct
__vbaOnError
ord595
_adj_fdiv_m16i
_adj_fdivr_m16i
_CIsin
ord525
ord632
__vbaChkstk
EVENT_SINK_AddRef
__vbaStrCmp
__vbaVarTstEq
__vbaAryConstruct2
DllFunctionCall
ord673
_adj_fpatan
__vbaLateIdCallLd
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
__vbaStrToUnicode
_adj_fprem
_adj_fdivr_m64
ord607
ord608
__vbaFPException
__vbaInStrVar
ord645
_CIlog
__vbaErrorOverflow
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
ord574
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaVarTstNe
__vbaI4Var
__vbaStrToAnsi
__vbaVarDup
__vbaFpI4
ord616
__vbaVarCopy
__vbaVarLateMemCallLd
ord617
__vbaVarSetObjAddref
_CIatan
__vbaStrMove
ord618
ord619
_allmul
_CItan
_CIexp
__vbaFreeStr
__vbaFreeObj
Sections
.text Size: 732KB - Virtual size: 728KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ