Static task
static1
Behavioral task
behavioral1
Sample
64d4c37a35156dacf3a68e37a3350cd6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
64d4c37a35156dacf3a68e37a3350cd6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
64d4c37a35156dacf3a68e37a3350cd6_JaffaCakes118
-
Size
204KB
-
MD5
64d4c37a35156dacf3a68e37a3350cd6
-
SHA1
4e3fe150f1f54775c78d21414cd43d44f3ea23f6
-
SHA256
7a9e382d57b8128557da558ac2c988eadc670e56cb4804fcdf130f8f6ca54c9a
-
SHA512
d8e90bf2a914401b86e132789a5791db633d8da310c59f0c855566583a487456e8aec4d61cf10dddebee367e1f45a070d62ffe7d9909977330c4e886eebffb4d
-
SSDEEP
3072:9FeODNAUrSqDMKKVILkt6i2ox7c39b1a0J86W8xXCKNWOHU/ezYMVWtG4SPUkxbu:9FeGpfMtboVBJtNWyPnYG4fUbu
Malware Config
Signatures
Files
-
64d4c37a35156dacf3a68e37a3350cd6_JaffaCakes118.exe windows:4 windows x86 arch:x86
e60c81803d69802a44293b77dcfe8006
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
1c:2d:d6:1a:35:e6:5d:f6:29:97:01:ff:9b:e5:ca:44Certificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before20/01/2010, 00:00Not After24/01/2012, 23:59SubjectCN=BITDEFENDER LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=BITDEFENDER LLC,L=Fort Lauderdale,ST=Florida,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21/05/2009, 00:00Not After20/05/2019, 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
51:ab:b8:36:24:17:19:74:da:e2:94:1a:ad:bd:c7:ad:07:6e:52:51Signer
Actual PE Digest51:ab:b8:36:24:17:19:74:da:e2:94:1a:ad:bd:c7:ad:07:6e:52:51Digest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
SetLocaleInfoA
GetLocalTime
lstrcmpi
AddAtomA
SetEvent
lstrcatA
EnumDateFormatsA
GetProcAddress
OpenEventA
GetModuleFileNameA
GetExpandedNameW
GetSystemInfo
GetCurrentThread
DuplicateHandle
DeleteAtom
GetModuleHandleA
GetShortPathNameW
GetEnvironmentVariableA
GetLastError
GetDiskFreeSpaceA
GetFullPathNameW
CreateEventA
GetProcessHeaps
BeginUpdateResourceA
lstrcpynA
SuspendThread
CreateEventW
InitializeCriticalSection
TlsAlloc
GetProcessHeap
GetSystemDefaultLangID
GetLocaleInfoW
GetComputerNameA
SetErrorMode
CreateSemaphoreW
SetPriorityClass
CompareStringA
SearchPathA
CreateDirectoryA
SetCurrentDirectoryW
ExitThread
GetCommandLineA
SetComputerNameA
IsBadStringPtrA
user32
GetDCEx
WaitMessage
IsWindow
ArrangeIconicWindows
CharPrevW
MoveWindow
GetClassInfoExW
GetCursorPos
CharLowerA
GetIconInfo
CreateDesktopW
CallWindowProcW
LoadMenuW
DefWindowProcA
MonitorFromRect
GetClientRect
EndMenu
SetDlgItemInt
GetParent
gdi32
DescribePixelFormat
SetDCBrushColor
ResizePalette
StartPage
ModifyWorldTransform
GetClipBox
GetBkMode
ExtFloodFill
EnumICMProfilesA
CreateRoundRectRgn
GetPolyFillMode
GetCharABCWidthsI
SetSystemPaletteUse
CreateSolidBrush
GetMetaFileA
SetBkMode
advapi32
RegCreateKeyW
RegRestoreKeyA
RegFlushKey
shlwapi
SHGetValueW
StrRetToStrW
PathIsUNCW
StrRetToStrA
StrDupA
StrStrA
comdlg32
GetSaveFileNameA
GetOpenFileNameW
ReplaceTextW
PrintDlgExW
oleaut32
LoadTypeLib
GetRecordInfoFromGuids
version
GetFileVersionInfoW
VerInstallFileW
inetcomm
HrAttachDataFromFile
MimeOleCreateByteStream
HrAthGetFileName
CreateRASTransport
MimeOleSetBodyPropA
GetDllMajorVersion
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.VqkkjU Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.uZgjfC Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hEYO Size: 1KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lNjS Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.duM Size: 512B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xkix Size: 2KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.XEio Size: 1024B - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.HGPN Size: 1024B - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ