Static task
static1
Behavioral task
behavioral1
Sample
0c0d3ad065df5463e3d6829c38eabff6_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0c0d3ad065df5463e3d6829c38eabff6_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
0c0d3ad065df5463e3d6829c38eabff6_JaffaCakes118
-
Size
92KB
-
MD5
0c0d3ad065df5463e3d6829c38eabff6
-
SHA1
560450f95ea61b374a5955b0cbc2f3aa5b6c4d75
-
SHA256
14d5626fc23b52ba4b6b8422e763aef450b7b89f19739ed011c005f38bdf1229
-
SHA512
084c64c6a0d0e0c7be4c9ea3fbf9e56a3d8b47be64b02f548efd361ad6251b09fd36aaf32a16e2e805ae798a61fd84041bb1cce39d442abaac5c9e3caafed5f5
-
SSDEEP
1536:7EUQEXXCWUl4J5FwDy/+ATsxRzWqw2CFw9sv+kd:7ELEnCvl4my/tTsTzWzw9sHd
Malware Config
Signatures
Files
-
0c0d3ad065df5463e3d6829c38eabff6_JaffaCakes118.dll windows:5 windows x86 arch:x86
6b3cbb3e05f9131f9b66c33f55cc3f65
Code Sign
4a:19:d2:38:8c:82:59:1c:a5:5d:73:5f:15:5d:dc:a3Certificate
IssuerOU=VeriSign\, Inc.+OU=VeriSign Time Stamping Service Root+OU=NO LIABILITY ACCEPTED\, (c)97 VeriSign\, Inc.,O=VeriSign Trust NetworkNot Before12/05/1997, 00:00Not After07/01/2004, 23:59SubjectOU=VeriSign\, Inc.+OU=VeriSign Time Stamping Service Root+OU=NO LIABILITY ACCEPTED\, (c)97 VeriSign\, Inc.,O=VeriSign Trust Network08:7a:6d:5c:6f:62:93:4f:ba:c4:fd:43:e1:14:18:9dCertificate
IssuerOU=VeriSign\, Inc.+OU=VeriSign Time Stamping Service Root+OU=NO LIABILITY ACCEPTED\, (c)97 VeriSign\, Inc.,O=VeriSign Trust NetworkNot Before28/02/2001, 00:00Not After06/01/2004, 23:59SubjectCN=VeriSign Time Stamping Service,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)01,O=VeriSign\, Inc.Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
c1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10/01/1997, 07:00Not After31/12/2020, 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporation61:05:76:74:00:00:00:00:00:2dCertificate
IssuerCN=Microsoft Windows Verification Intermediate PCA,OU=Copyright (c) 1999 Microsoft Corp.,O=Microsoft Corporation,L=Redmond,ST=WA,C=USNot Before18/10/2002, 19:02Not After18/12/2003, 19:12SubjectCN=Microsoft Windows 2000 Publisher,OU=Copyright (c) 2002 Microsoft Corp.,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
6a:0b:99:4f:c0:00:9d:aa:11:d3:30:a8:95:60:ac:faCertificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before01/07/1999, 07:00Not After15/10/2005, 07:00SubjectCN=Microsoft Windows Verification Intermediate PCA,OU=Copyright (c) 1999 Microsoft Corp.,O=Microsoft Corporation,L=Redmond,ST=WA,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
msvcrt
wcscpy
wcsncpy
wcscmp
_wcsicmp
memmove
_except_handler3
swprintf
wcscat
wcschr
wcsrchr
_vsnwprintf
towlower
wcsstr
wcstoul
_wcsnicmp
wcslen
ntdll
NtCreateSection
LdrFindResource_U
LdrAccessResource
NtSetEvent
NtResetEvent
RtlFreeHeap
RtlReAllocateHeap
RtlAllocateHeap
LdrLoadDll
RtlInitString
LdrGetProcedureAddress
NtOpenKey
RtlNtStatusToDosError
RtlInitializeCriticalSection
NtQueryInformationFile
NtWriteFile
NtDeleteFile
NtCreateKey
NtQueryValueKey
NtSetValueKey
RtlFreeUnicodeString
NtFlushBuffersFile
NtSetInformationFile
NtUnmapViewOfSection
NtMapViewOfSection
RtlDosPathNameToNtPathName_U
NtCreateFile
NtCreateEvent
NtNotifyChangeDirectoryFile
NtFsControlFile
RtlGetAce
RtlQueryInformationAcl
RtlGetDaclSecurityDescriptor
NtQuerySecurityObject
RtlCompareUnicodeString
NtOpenFile
NtWaitForMultipleObjects
RtlAppendUnicodeStringToString
NtWaitForSingleObject
LdrUnloadDll
RtlStringFromGUID
RtlExpandEnvironmentStrings_U
RtlEnterCriticalSection
RtlInitUnicodeString
NtClose
RtlLeaveCriticalSection
user32
DialogBoxParamW
MessageBoxW
SetWindowLongW
MoveWindow
GetWindowRect
UnregisterDeviceNotification
RegisterWindowMessageW
GetDlgItemTextW
SetDlgItemTextW
RegisterDeviceNotificationW
wsprintfW
PostMessageW
GetUserObjectInformationW
CreateDialogParamW
SendMessageW
PeekMessageW
MsgWaitForMultipleObjects
IsDialogMessageW
TranslateMessage
EnableWindow
ShowWindow
UpdateWindow
SetForegroundWindow
EndDialog
FindWindowW
GetSystemMetrics
CloseDesktop
LoadStringW
OpenInputDesktop
SetThreadDesktop
GetDlgItem
DispatchMessageW
kernel32
RaiseException
LeaveCriticalSection
EnterCriticalSection
GetComputerNameW
GetComputerNameExW
InitializeCriticalSection
GetProcAddress
LocalAlloc
LoadLibraryA
FreeLibrary
GetLastError
ResetEvent
GetTickCount
LocalFree
FormatMessageW
GetDriveTypeW
GetFileAttributesW
SetErrorMode
DelayLoadFailureHook
DisableThreadLibraryCalls
GetModuleFileNameW
WaitForSingleObject
OpenEventW
GetCurrentThreadId
GetFileSize
SetFileAttributesW
GetDiskFreeSpaceExW
SetLastError
ExpandEnvironmentStringsW
CloseHandle
CreateThread
SetEvent
CreateEventW
InterlockedExchange
CreateDirectoryW
GetSystemTime
CreateFileW
GetModuleHandleW
WriteFile
SetFilePointer
GetCurrentProcess
rpcrt4
RpcServerListen
RpcServerUseProtseqEpW
RpcServerRegisterIf
RpcBindingFree
I_RpcMapWin32Status
RpcBindingFromStringBindingW
RpcStringFreeW
RpcStringBindingComposeW
NdrClientCall2
NdrServerCall2
advapi32
ImpersonateLoggedOnUser
OpenProcessToken
ReportEventW
RegisterEventSourceW
GetFileSecurityW
SetFileSecurityW
RevertToSelf
DeregisterEventSource
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
AdjustTokenPrivileges
AllocateAndInitializeSid
SetSecurityDescriptorDacl
FreeSid
CheckTokenMembership
InitializeSecurityDescriptor
LookupPrivilegeValueW
sfcfiles
SfcGetFiles
Exports
Exports
SfcGetNextProtectedFile
SfcIsFileProtected
SfcWLEventLogoff
SfcWLEventLogon
SfpVerifyFile
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ