Static task
static1
Behavioral task
behavioral1
Sample
6482dfa77d942a2506bb72f2b0edf2d4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6482dfa77d942a2506bb72f2b0edf2d4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6482dfa77d942a2506bb72f2b0edf2d4_JaffaCakes118
-
Size
103KB
-
MD5
6482dfa77d942a2506bb72f2b0edf2d4
-
SHA1
26610d8cb1f69c7d6c2f9272ddde803034328bfa
-
SHA256
e4bd8f0e72b735d0f63ca3bbf493ce4f5459a0b78961f7abe1cb9ed865d9379c
-
SHA512
e3f24d086b4342d29ee17c95c4cdd04c9c826e7399adf251a80bbdb0eb850b773a68054d69db3c53ddf5d3decc59948a09ba0b7167f55933513c64a3d1ae5c9d
-
SSDEEP
1536:JVIj8DCwbBX9I5bUfk0HWVOmB+QqrWQZIcqIrvDIq+PbX/z7:JVImCk9rwFqrWUqIrvDJYbXL7
Malware Config
Signatures
Files
-
6482dfa77d942a2506bb72f2b0edf2d4_JaffaCakes118.exe windows:4 windows x86 arch:x86
63790b4021018840ee9d6a16750c4b16
Code Sign
42:46:9f:62:f8:41:3f:4e:bf:ce:ee:2e:dd:a8:7f:b2Certificate
IssuerCN=Root AgencyNot Before01/03/2012, 19:48Not After31/12/2039, 23:59SubjectCN=j2se.java.com38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
37:ab:ab:7a:c2:7c:24:2d:1d:5f:8f:73:27:38:ee:1f:d8:ab:04:4fSigner
Actual PE Digest37:ab:ab:7a:c2:7c:24:2d:1d:5f:8f:73:27:38:ee:1f:d8:ab:04:4fDigest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetStdHandle
VirtualProtect
LockResource
LoadResource
FindResourceA
GetVersionExA
HeapFree
GetProcessHeap
CreateFileA
VirtualAllocEx
GetCurrentProcess
ExitProcess
CreateMutexA
WaitForSingleObject
GetComputerNameA
GetModuleHandleA
GetWindowsDirectoryA
HeapAlloc
VirtualProtectEx
ReadFile
InterlockedExchange
RtlUnwind
VirtualQuery
advapi32
GetUserNameA
user32
GetWindow
wsprintfA
GetSystemMetrics
FindWindowA
GetClassInfoExA
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ