Static task
static1
Behavioral task
behavioral1
Sample
621ad2c840d1040b64493d45b3d995bb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
621ad2c840d1040b64493d45b3d995bb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
621ad2c840d1040b64493d45b3d995bb_JaffaCakes118
-
Size
87KB
-
MD5
621ad2c840d1040b64493d45b3d995bb
-
SHA1
42672dbfcc85e6d8c0f78f6f4acad91e602f4085
-
SHA256
e7930d5d3ac3db58431b197aff0d31509a8b3b6b415b413cfe6c44b5a9c192ad
-
SHA512
9f296006af1b108c06c838e9b4e67a508ade7750c082f3f6dadbded18f54f1d6fbd9b21bb1c45c1b1c91ec55fb0bac75a6ad21587c98dbd3a19621093844b9ee
-
SSDEEP
1536:5Gsdnu0W53JyYg1srKeC/06TE33dErK1QwJqRptGGF4ID:55dnu0W5ZyYi+KpM6TWrwrtGGF4I
Malware Config
Signatures
Files
-
621ad2c840d1040b64493d45b3d995bb_JaffaCakes118.exe windows:4 windows x86 arch:x86
4b7cf5131d2e296be23f3a22ab9adc11
Code Sign
4a:19:d2:38:8c:82:59:1c:a5:5d:73:5f:15:5d:dc:a3Certificate
IssuerOU=VeriSign\, Inc.+OU=VeriSign Time Stamping Service Root+OU=NO LIABILITY ACCEPTED\, (c)97 VeriSign\, Inc.,O=VeriSign Trust NetworkNot Before12/05/1997, 00:00Not After07/01/2004, 23:59SubjectOU=VeriSign\, Inc.+OU=VeriSign Time Stamping Service Root+OU=NO LIABILITY ACCEPTED\, (c)97 VeriSign\, Inc.,O=VeriSign Trust Network08:7a:6d:5c:6f:62:93:4f:ba:c4:fd:43:e1:14:18:9dCertificate
IssuerOU=VeriSign\, Inc.+OU=VeriSign Time Stamping Service Root+OU=NO LIABILITY ACCEPTED\, (c)97 VeriSign\, Inc.,O=VeriSign Trust NetworkNot Before28/02/2001, 00:00Not After06/01/2004, 23:59SubjectCN=VeriSign Time Stamping Service,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)01,O=VeriSign\, Inc.Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
c1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10/01/1997, 07:00Not After31/12/2020, 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporation6a:0b:99:4f:c0:00:de:aa:11:d4:d8:40:9a:a8:be:e6Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10/12/2000, 08:00Not After12/11/2005, 08:00SubjectCN=Microsoft Code Signing PCA,OU=Copyright (c) 2000 Microsoft Corp.,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
61:07:11:43:00:00:00:00:00:34Certificate
IssuerCN=Microsoft Code Signing PCA,OU=Copyright (c) 2000 Microsoft Corp.,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before25/05/2002, 00:55Not After25/11/2003, 01:05SubjectCN=Microsoft Corporation,OU=Copyright (c) 2002 Microsoft Corp.,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
26:bf:f7:7a:3c:95:f8:6e:7a:6e:fa:11:6b:b6:f2:b1:d9:e0:ad:58Signer
Actual PE Digest26:bf:f7:7a:3c:95:f8:6e:7a:6e:fa:11:6b:b6:f2:b1:d9:e0:ad:58Digest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
ose.pdb
Imports
msvcrt
_controlfp
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_vsnwprintf
_vsnprintf
wcsrchr
wcscmp
advapi32
RegEnumValueW
CryptReleaseContext
CryptAcquireContextW
SetFileSecurityW
RegDeleteKeyW
OpenThreadToken
CheckTokenMembership
ConvertStringSecurityDescriptorToSecurityDescriptorW
LookupAccountNameW
AllocateAndInitializeSid
FreeSid
CryptHashData
CryptGetHashParam
CryptCreateHash
CryptDestroyHash
RegisterServiceCtrlHandlerW
RegCloseKey
RegEnumKeyExW
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
SetThreadToken
RegQueryValueExW
RegNotifyChangeKeyValue
SetServiceStatus
StartServiceCtrlDispatcherW
DuplicateToken
RegDeleteValueW
kernel32
FormatMessageA
GetComputerNameW
GetModuleHandleA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
HeapSize
RaiseException
LoadLibraryA
MoveFileExW
GetLastError
GetModuleFileNameW
CloseHandle
SetEvent
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetDriveTypeW
GetLogicalDrives
lstrcmpW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
Sleep
ExitProcess
InitializeCriticalSection
GetCommandLineW
GetTickCount
ReleaseMutex
ResetEvent
WaitForMultipleObjectsEx
SetErrorMode
CreateEventW
CreateMutexW
CreateProcessW
GetSystemInfo
InterlockedExchange
CreateFileA
ReadFile
SetFilePointer
DosDateTimeToFileTime
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryW
WideCharToMultiByte
CreateFileW
ReleaseSemaphore
WaitForSingleObject
WaitForMultipleObjects
CreateThread
CreateSemaphoreW
VirtualFree
VirtualAlloc
SetFilePointerEx
GetSystemTimeAsFileTime
SystemTimeToFileTime
GetSystemTime
SetFileTime
SetEndOfFile
WriteFile
GlobalFree
GlobalAlloc
GetFileAttributesExW
GetFileSizeEx
FindClose
FindFirstFileW
GetFileAttributesW
CopyFileW
CreateHardLinkW
SetFileAttributesW
DeleteFileW
GetTempPathA
GetTempPathW
GetFileTime
FindNextFileW
LocalFree
GetCurrentThread
CreateDirectoryW
RemoveDirectoryW
lstrlenA
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
LocalAlloc
rpcrt4
RpcImpersonateClient
RpcRevertToSelf
RpcServerUnregisterIf
RpcServerUseProtseqEpW
RpcServerRegisterIfEx
NdrServerCall2
Sections
.text Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yvs Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE