Overview
overview
10Static
static
70dbea3be7b...18.exe
windows7-x64
70dbea3be7b...18.exe
windows10-2004-x64
7$PROGRAMFI...rt.exe
windows7-x64
3$PROGRAMFI...rt.exe
windows10-2004-x64
7$PROGRAMFI...se.exe
windows7-x64
3$PROGRAMFI...se.exe
windows10-2004-x64
3$PROGRAMFI...00.vbs
windows7-x64
10$PROGRAMFI...00.vbs
windows10-2004-x64
10Behavioral task
behavioral1
Sample
0dbea3be7bbf9319edb8696b01b0e340_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0dbea3be7bbf9319edb8696b01b0e340_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PROGRAMFILES/WINRAR/Formats/360Start.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PROGRAMFILES/WINRAR/Formats/360Start.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PROGRAMFILES/WINRAR/Formats/360se.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PROGRAMFILES/WINRAR/Formats/360se.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PROGRAMFILES/WINRAR/Formats/KB981400.vbs
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$PROGRAMFILES/WINRAR/Formats/KB981400.vbs
Resource
win10v2004-20240508-en
General
-
Target
0dbea3be7bbf9319edb8696b01b0e340_JaffaCakes118
-
Size
118KB
-
MD5
0dbea3be7bbf9319edb8696b01b0e340
-
SHA1
8bd129430c7be6ddb21e0b440c84fd0dceb78409
-
SHA256
2df0456d63ff176e01fb139bc7aef3b5924b6a7aeca6020a99eb0a5425090e75
-
SHA512
f8425e50f0441a2865ec3d72c15731103ed70f3adc054bd705292be925e00967272dd390c3efa15703416d313c62973afc295ecfd58eadce240072aeb14c0bee
-
SSDEEP
3072:zgQWixjPnikuHVV7msx4iscOwIBNAKsSV+hOszp:zgkPniB9mLiHO7EZ8a
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource 0dbea3be7bbf9319edb8696b01b0e340_JaffaCakes118 unpack001/$PROGRAMFILES/WINRAR/Formats/360se.exe unpack001/out.upx -
NSIS installer 1 IoCs
resource yara_rule static1/unpack001/out.upx nsis_installer_2
Files
-
0dbea3be7bbf9319edb8696b01b0e340_JaffaCakes118.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 192KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
$PROGRAMFILES/WINRAR/Formats/360Start.exe.exe windows:4 windows x86 arch:x86
f1cc683d5e354a9642b4734356c74016
Code Sign
01Certificate
IssuerCN=Thawte Premium Server CA,OU=Certification Services Division,O=Thawte Consulting cc,L=Cape Town,ST=Western Cape,C=ZA,1.2.840.113549.1.9.1=#0c197072656d69756d2d736572766572407468617774652e636f6dNot Before01/08/1996, 00:00Not After31/12/2020, 23:59SubjectCN=Thawte Premium Server CA,OU=Certification Services Division,O=Thawte Consulting cc,L=Cape Town,ST=Western Cape,C=ZA,1.2.840.113549.1.9.1=#0c197072656d69756d2d736572766572407468617774652e636f6d0aCertificate
IssuerCN=Thawte Premium Server CA,OU=Certification Services Division,O=Thawte Consulting cc,L=Cape Town,ST=Western Cape,C=ZA,1.2.840.113549.1.9.1=#0c197072656d69756d2d736572766572407468617774652e636f6dNot Before06/08/2003, 00:00Not After05/08/2013, 23:59SubjectCN=Thawte Code Signing CA,O=Thawte Consulting (Pty) Ltd.,C=ZAExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
21:d9:1d:91:5f:64:fe:5a:ea:a1:6d:d9:b4:6f:06:ddCertificate
IssuerCN=Thawte Code Signing CA,O=Thawte Consulting (Pty) Ltd.,C=ZANot Before22/10/2008, 00:00Not After23/11/2010, 23:59SubjectCN=Qizhi Software (beijing) Co. Ltd,OU=SECURE APPLICATION DEVELOPMENT,O=Qizhi Software (beijing) Co. Ltd,L=Beijing,ST=Beijing,C=CNExtended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
GetPrivateProfileStringW
GetCurrentProcess
WaitForSingleObject
GetExitCodeProcess
GetModuleFileNameW
GetShortPathNameW
FindClose
FindNextFileW
RemoveDirectoryW
FindFirstFileW
WriteFile
SetFilePointer
CreateFileW
GetLastError
CreateDirectoryW
InterlockedDecrement
GetVersionExW
TerminateProcess
ExitProcess
MultiByteToWideChar
LoadLibraryA
GetStringTypeW
GetStringTypeA
SetStdHandle
FlushFileBuffers
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
GetFileType
GetStdHandle
SetHandleCount
ReadFile
HeapSize
HeapAlloc
HeapReAlloc
HeapFree
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
RtlUnwind
GetPrivateProfileIntW
GetCurrentProcessId
GetTickCount
WritePrivateProfileStringW
lstrcatW
CopyFileW
GetLongPathNameW
CreateToolhelp32Snapshot
SetEndOfFile
Module32FirstW
lstrcpyW
lstrlenW
WideCharToMultiByte
LoadLibraryW
GetProcAddress
Sleep
CreateProcessW
CloseHandle
FreeLibrary
user32
BeginPaint
DrawTextW
ShowWindow
DialogBoxParamW
PostMessageW
FindWindowW
EndPaint
PeekMessageW
LoadIconW
GetDlgItem
SetWindowPos
EnableMenuItem
GetSystemMenu
IsWindow
MessageBoxW
DestroyWindow
SetTimer
DispatchMessageW
EndDialog
LoadStringW
GetWindowThreadProcessId
SendMessageW
GetDesktopWindow
CreateDialogParamW
TranslateMessage
gdi32
GetObjectW
CreateFontIndirectW
SetBkMode
SelectObject
advapi32
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegLoadKeyW
RegOpenKeyExW
RegUnLoadKeyW
RegCloseKey
RegSaveKeyW
shell32
SHGetSpecialFolderPathW
SHFileOperationW
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
SHSetValueW
SHGetValueW
SHDeleteValueW
SHDeleteKeyW
PathIsRootW
PathFileExistsW
StrStrW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
__360sta Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
$PROGRAMFILES/WINRAR/Formats/360se.exe.exe windows:4 windows x86 arch:x86
47785272aac878176aad77fb50f14a5c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaStrI2
_CIcos
_adj_fptan
_adj_fdiv_m64
_adj_fprem1
__vbaSetSystemError
_adj_fdiv_m32
_adj_fdiv_m16i
_adj_fdivr_m16i
_CIsin
__vbaChkstk
DllFunctionCall
_adj_fpatan
_CIsqrt
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaFPException
_CIlog
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaStrToAnsi
_CIatan
__vbaStrMove
_allmul
_CItan
_CIexp
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
$PROGRAMFILES/WINRAR/Formats/KB981400.vbs.vbs
-
$PROGRAMFILES/WINRAR/Formats/e.reg
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ