Static task
static1
Behavioral task
behavioral1
Sample
6f199978dc380048caa82f5e8c1707b0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f199978dc380048caa82f5e8c1707b0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f199978dc380048caa82f5e8c1707b0_JaffaCakes118
-
Size
1.3MB
-
MD5
6f199978dc380048caa82f5e8c1707b0
-
SHA1
e5e6fd0892bf363da5c83df661d302e4bdaa1c2e
-
SHA256
893147c5092c4af5403d85bb0ffce8d5f4203216fd21a8a0d1f1b5efb18cd1a5
-
SHA512
8f33f27b0ce69fc9a017021674e7c620934d982fc77ee8421c8e8fe5d85aeb7949d817f545c473aa65c204a6d341bffa8cd2433faaeb27674b4dc904f77c527c
-
SSDEEP
24576:Nb/sMPL71yJMeo9wRN4LG1pEmbC76MmSKen3W0QjpMQLoJn1iUMTKQ9W03:9/VPF+o9wfJpveB+prcyHTKP03
Malware Config
Signatures
Files
-
6f199978dc380048caa82f5e8c1707b0_JaffaCakes118.exe windows:5 windows x86 arch:x86
43a684f95fe6a1dc4c695734cfba80dd
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US67:24:34:0d:db:c7:25:2f:7f:b7:14:b8:12:a5:c0:4dCertificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before27/11/2009, 00:00Not After27/11/2011, 23:59SubjectCN=YNK JAPAN Inc,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=YNK JAPAN Inc,L=\ Nihonbashi Kodenmachou10-6,ST=Chuo-ku,C=JPExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21/05/2009, 00:00Not After20/05/2019, 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessW
SetThreadPriority
GetCurrentThread
SetPriorityClass
ResumeThread
GetEnvironmentVariableA
GetShortPathNameA
GetStartupInfoA
GetTempPathA
FindResourceA
LoadResource
GetModuleHandleA
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
GetModuleFileNameA
SetFilePointer
ReadFile
CloseHandle
DeleteFileA
MoveFileExA
Sleep
GetSystemDirectoryA
SetFileAttributesA
GetTickCount
lstrcatA
GetCurrentProcess
user32
wsprintfA
advapi32
CloseServiceHandle
ControlService
DeleteService
StartServiceA
OpenSCManagerA
CreateServiceA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
OpenServiceA
msvcrt
__setusermatherr
_except_handler3
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
_itoa
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
iphlpapi
GetAdaptersInfo
psapi
GetMappedFileNameW
Sections
yejotz Size: 1.3MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ejouz Size: 32B - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ejpuzek Size: 32B - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pu Size: 32B - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zfkpuafk Size: 32B - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pvafkq Size: 64B - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE