Static task
static1
Behavioral task
behavioral1
Sample
38385f7185268cce2eb8e379873af749_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
38385f7185268cce2eb8e379873af749_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38385f7185268cce2eb8e379873af749_JaffaCakes118
-
Size
1.3MB
-
MD5
38385f7185268cce2eb8e379873af749
-
SHA1
2bd936dd29bf36157c640557f2529381b9ba9933
-
SHA256
008adb1369fa1bb42ee34b45e3906849528faf30bfad08e65fe3fdc5588a02e2
-
SHA512
497241bf3e642ccdb992bd1f129ce2b8325d75cd0e400fe983d75ebaa0452220d53e50e4d0627f422caa47b808031515daa7f41f5ffbb94d3c2f04a5de2c442e
-
SSDEEP
24576:jb/sMPL71yJMeo9wRN4LG1pEmbC76MmSKen3W0QjpMQLoJn1iUMTKQ9WoN:H/VPF+o9wfJpveB+prcyHTKPoN
Malware Config
Signatures
Files
-
38385f7185268cce2eb8e379873af749_JaffaCakes118.exe windows:5 windows x86 arch:x86
43a684f95fe6a1dc4c695734cfba80dd
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US67:24:34:0d:db:c7:25:2f:7f:b7:14:b8:12:a5:c0:4dCertificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before27/11/2009, 00:00Not After27/11/2011, 23:59SubjectCN=YNK JAPAN Inc,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=YNK JAPAN Inc,L=\ Nihonbashi Kodenmachou10-6,ST=Chuo-ku,C=JPExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21/05/2009, 00:00Not After20/05/2019, 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessW
SetThreadPriority
GetCurrentThread
SetPriorityClass
ResumeThread
GetEnvironmentVariableA
GetShortPathNameA
GetStartupInfoA
GetTempPathA
FindResourceA
LoadResource
GetModuleHandleA
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
GetModuleFileNameA
SetFilePointer
ReadFile
CloseHandle
DeleteFileA
MoveFileExA
Sleep
GetSystemDirectoryA
SetFileAttributesA
GetTickCount
lstrcatA
GetCurrentProcess
user32
wsprintfA
advapi32
CloseServiceHandle
ControlService
DeleteService
StartServiceA
OpenSCManagerA
CreateServiceA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
OpenServiceA
msvcrt
__setusermatherr
_except_handler3
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
_itoa
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
iphlpapi
GetAdaptersInfo
psapi
GetMappedFileNameW
Sections
yejotz Size: 1.3MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ejouz Size: 32B - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ejpuzek Size: 32B - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pu Size: 32B - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zfkpuafk Size: 32B - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pvafkq Size: 64B - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE