Static task
static1
Behavioral task
behavioral1
Sample
86e659078f250f85925a545242ea2501_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
86e659078f250f85925a545242ea2501_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86e659078f250f85925a545242ea2501_JaffaCakes118
-
Size
331KB
-
MD5
86e659078f250f85925a545242ea2501
-
SHA1
de53c4dc566c55a5379b302222b49acaa163e658
-
SHA256
981e8920d529107ef983196ab3e44dd249251b69a569a90e08fb2370b442f101
-
SHA512
7266cb0e806f9bd7b59ef58063223f6c63735abf50b44f509e8dde094d47322256469653d5486d938afb00045d4204b502c1551c77967d188c16b7ac349be85d
-
SSDEEP
6144:UohcmaHVaPhQHhdo66nfZD6bcJQFBGoWL1e5SjizwJ+MLglvO6TovUyEpR:UohcmYVZG66fZWBgReoizwtUlW6svUx
Malware Config
Signatures
Files
-
86e659078f250f85925a545242ea2501_JaffaCakes118.exe windows:4 windows x86 arch:x86
61523045ebb692fbe30ee1d6f1bcd703
Code Sign
c1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10-01-1997 07:00Not After31-12-2020 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporationc1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10-01-1997 07:00Not After31-12-2020 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporation61:47:52:ba:00:00:00:00:00:04Certificate
IssuerCN=Microsoft Timestamping PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before16-09-2006 01:53Not After16-09-2011 02:03SubjectCN=Microsoft Timestamping Service,OU=nCipher DSE ESN:D8A9-CFCC-579C,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
61:49:7c:ed:00:00:00:00:00:05Certificate
IssuerCN=Microsoft Timestamping PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before16-09-2006 01:55Not After16-09-2011 02:05SubjectCN=Microsoft Timestamping Service,OU=nCipher DSE ESN:10D8-5847-CBF8,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
6a:0b:99:4f:c0:00:25:ab:11:db:45:1f:58:7a:67:a2Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before16-09-2006 01:04Not After15-09-2019 07:00SubjectCN=Microsoft Timestamping PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
6a:0b:99:4f:c0:00:1d:ab:11:da:c4:02:a1:66:27:baCertificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before04-04-2006 17:44Not After26-04-2012 07:00SubjectCN=Microsoft Code Signing PCA,OU=Copyright (c) 2000 Microsoft Corp.,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
61:46:9e:cb:00:04:00:00:00:65Certificate
IssuerCN=Microsoft Code Signing PCA,OU=Copyright (c) 2000 Microsoft Corp.,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before04-04-2006 19:43Not After04-10-2007 19:53SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
23:cd:d3:e9:fc:f2:7f:de:5f:94:35:2b:d6:8a:3a:c7:53:1b:9a:2bSigner
Actual PE Digest23:cd:d3:e9:fc:f2:7f:de:5f:94:35:2b:d6:8a:3a:c7:53:1b:9a:2bDigest Algorithmsha1PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
msohelp.pdb
Imports
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegEnumKeyExA
ReportEventW
RegisterEventSourceW
RegQueryValueExW
RegOpenKeyExW
DeregisterEventSource
gdi32
GetTextExtentPoint32W
CreateSolidBrush
DeleteObject
BitBlt
SetTextColor
DeleteDC
CreateBitmap
SelectObject
CreateCompatibleDC
GetBitmapBits
GetObjectA
PatBlt
CreateFontIndirectA
GetDeviceCaps
ExtTextOutA
ExtTextOutW
SetBkColor
kernel32
RaiseException
InitializeCriticalSection
DeleteCriticalSection
LocalAlloc
GetLastError
LocalFree
GlobalAlloc
GlobalFree
InterlockedDecrement
GetCurrentThreadId
GetVersionExA
InterlockedIncrement
lstrlenW
GetModuleHandleA
MultiByteToWideChar
lstrlenA
GetModuleFileNameA
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetProcAddress
LoadLibraryA
GetThreadLocale
GetSystemDefaultLCID
LockResource
GetSystemDefaultLangID
MulDiv
GetLocaleInfoA
lstrcmpA
GetACP
InterlockedExchange
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
VirtualProtect
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetProcessHeap
LoadLibraryW
GetModuleFileNameW
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
shlwapi
wvnsprintfW
wvnsprintfA
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
__CxxFrameHandler
swprintf
_onexit
??1type_info@@UAE@XZ
__dllonexit
realloc
malloc
atoi
??2@YAPAXI@Z
??3@YAXPAX@Z
free
_except_handler3
memset
_CxxThrowException
user32
CharNextA
GetSystemMetrics
GetWindowRect
SystemParametersInfoA
OffsetRect
SetWindowPos
SetWindowTextA
SetWindowTextW
IsWindowUnicode
SetRect
GetClientRect
IsZoomed
GetMessagePos
GetAsyncKeyState
UpdateWindow
FindWindowA
GetSysColor
GetClassNameA
InvalidateRect
EndPaint
IsWindow
BeginPaint
ReleaseCapture
DispatchMessageA
GetIconInfo
InflateRect
GetDC
GetCursorPos
GetCursor
ClientToScreen
EnumChildWindows
GetActiveWindow
RegisterClassExA
LoadCursorA
GetCapture
CharUpperA
CharLowerA
RegisterWindowMessageA
LoadBitmapA
LoadIconA
GetWindowDC
GetMessageA
ReleaseDC
TranslateMessage
SendMessageA
SetFocus
FindWindowExA
GetWindow
GetWindowThreadProcessId
GetForegroundWindow
LoadStringA
MessageBoxA
RegisterClassA
CreateWindowExA
SetWindowLongA
GetWindowLongA
DefWindowProcA
SetCapture
DestroyWindow
PostQuitMessage
EnumWindows
IsWindowEnabled
PostMessageA
SetTimer
KillTimer
SendMessageTimeoutA
IsWindowVisible
ShowWindow
GetWindowPlacement
SetRectEmpty
IsRectEmpty
IsIconic
GetClassNameW
GetParent
SetForegroundWindow
SetWindowPlacement
ole32
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoUninitialize
CoRegisterClassObject
CoRevokeClassObject
oleaut32
VariantInit
VarUI4FromStr
Exports
Exports
_resetstkoflw
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 692B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
*`� Size: 238KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE