Static task
static1
Behavioral task
behavioral1
Sample
0810959693b40e9b61046f594f86bdb4_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0810959693b40e9b61046f594f86bdb4_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0810959693b40e9b61046f594f86bdb4_JaffaCakes118
-
Size
83KB
-
MD5
0810959693b40e9b61046f594f86bdb4
-
SHA1
e36843ea2d3c62a2c86db4d5b8ba4d544e92fc84
-
SHA256
48f0bbc3b679aac6b1a71c06f19bb182123e74df8bb0b6b04ebe99100c57a41e
-
SHA512
c33588135691fb19c15d85162dd57c1b441a3ea3eb42323d05aed7f5fc2ab6a92df487769712bc88dd5b8d301b1e3550697a4823aaeae6c5286a2e68734979cd
-
SSDEEP
1536:4+Gy0kiu8POWyOjHkTBwoCjCatZczsQFaC+EL:4Py0kw13xjCatZhaaqL
Malware Config
Signatures
Files
-
0810959693b40e9b61046f594f86bdb4_JaffaCakes118.exe windows:4 windows x86 arch:x86
401e69d77a913e603a71043b4266ca70
Code Sign
3c:91:31:cb:1f:f6:d0:1b:0e:9a:b8:d0:44:bf:12:beCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After02/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US79:a2:a5:85:f9:d1:15:42:13:d9:b8:3e:f6:b6:8d:edCertificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before01/05/2012, 00:00Not After31/12/2012, 23:59SubjectCN=Symantec Time Stamping Services Signer - G3,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
25:0c:e8:e0:30:61:2e:9f:2b:89:f7:05:4d:7c:f8:fdCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before08/11/2006, 00:00Not After07/11/2021, 23:59SubjectCN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
11:21:49:47:5c:70:98:48:32:28:4e:fd:4d:a9:4f:ffCertificate
IssuerCN=VeriSign Class 3 Code Signing 2010 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)10,O=VeriSign\, Inc.,C=USNot Before17/02/2012, 00:00Not After16/02/2013, 23:59SubjectCN=ZerodinGames Co.\,Ltd,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=ZerodinGames Co.\,Ltd,L=Gangnam-gu,ST=Seoul,C=KRExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
52:00:e5:aa:25:56:fc:1a:86:ed:96:c9:d4:4b:33:c7Certificate
IssuerCN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before08/02/2010, 00:00Not After07/02/2020, 23:59SubjectCN=VeriSign Class 3 Code Signing 2010 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)10,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Process32Next
lstrcmpiA
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetProcAddress
GetModuleHandleA
DeleteFileA
FreeLibrary
WaitForSingleObject
SetFileAttributesA
GetCurrentProcess
GetModuleFileNameA
CreateMutexA
GetCurrentThreadId
CreateDirectoryA
CreateThread
LoadLibraryA
TerminateThread
InterlockedExchange
GetLastError
CreateFileA
GetFileSize
ReadFile
SetFilePointer
WriteFile
Sleep
CloseHandle
FlushFileBuffers
SetStdHandle
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetCPInfo
RtlUnwind
InterlockedDecrement
InterlockedIncrement
TlsSetValue
TlsGetValue
ExitThread
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
TlsAlloc
SetLastError
HeapAlloc
TerminateProcess
HeapReAlloc
HeapSize
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
RaiseException
user32
GetMessageA
GetInputState
PostThreadMessageA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteValueA
ws2_32
gethostbyname
WSAStartup
send
setsockopt
WSAIoctl
connect
recv
closesocket
htons
shutdown
WSASocketA
psapi
EnumProcessModules
GetModuleBaseNameA
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE