Static task
static1
Behavioral task
behavioral1
Sample
b45a6a4e92ea55e5fe60293725eabf04_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b45a6a4e92ea55e5fe60293725eabf04_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b45a6a4e92ea55e5fe60293725eabf04_JaffaCakes118
-
Size
762KB
-
MD5
b45a6a4e92ea55e5fe60293725eabf04
-
SHA1
f5156b5155fc133ef22382fd65f33a33bf0c798a
-
SHA256
d5a6888fd2f921a6e61f7b3b3fa8a9cdf4497f1885451d9bfe7efe1bda213b2e
-
SHA512
f49df24344ebd60b3883e3e6d7846c0ac761f47a52df34e1c1c03190773fb7a6c25127778ce1f07d59283d3be57f978b2c51bd10c4c5e178b76188d2a753afab
-
SSDEEP
12288:/g5zwR+X/eOyaiqlgLCH9Eq+0BbSox1QV:IfX/eO4qqLCHPb9M
Malware Config
Signatures
Files
-
b45a6a4e92ea55e5fe60293725eabf04_JaffaCakes118.exe windows:5 windows x86 arch:x86
5b6b488e09f3c1039a05ea7984d16737
Code Sign
c1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10/01/1997, 07:00Not After31/12/2020, 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporationc1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10/01/1997, 07:00Not After31/12/2020, 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporation2e:ab:11:dc:50:ff:5c:9d:cb:c0Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before22/08/2007, 22:31Not After25/08/2012, 07:00SubjectCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:0f:78:4d:00:00:00:00:00:03Certificate
IssuerCN=Microsoft Code Signing PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before23/08/2007, 00:23Not After23/02/2009, 00:33SubjectCN=Microsoft Corporation,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
61:47:52:ba:00:00:00:00:00:04Certificate
IssuerCN=Microsoft Timestamping PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before16/09/2006, 01:53Not After16/09/2011, 02:03SubjectCN=Microsoft Timestamping Service,OU=nCipher DSE ESN:D8A9-CFCC-579C,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
61:49:7c:ed:00:00:00:00:00:05Certificate
IssuerCN=Microsoft Timestamping PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before16/09/2006, 01:55Not After16/09/2011, 02:05SubjectCN=Microsoft Timestamping Service,OU=nCipher DSE ESN:10D8-5847-CBF8,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
6a:0b:99:4f:c0:00:25:ab:11:db:45:1f:58:7a:67:a2Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before16/09/2006, 01:04Not After15/09/2019, 07:00SubjectCN=Microsoft Timestamping PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0b:2f:29:9c:72:19:5b:62:65:c5:90:21:79:f6:37:03:be:93:31:b0Signer
Actual PE Digest0b:2f:29:9c:72:19:5b:62:65:c5:90:21:79:f6:37:03:be:93:31:b0Digest Algorithmsha1PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
aspnet_regiis.pdb
Imports
kernel32
InterlockedCompareExchange
CreateThread
LocalFree
CloseHandle
WaitForSingleObject
FreeLibrary
FormatMessageW
LocalAlloc
GetConsoleScreenBufferInfo
GetStdHandle
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
InterlockedExchange
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
Sleep
ExitThread
GetCurrentProcessId
lstrlenW
GetLastError
msvcr80
_initterm
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
__winitenv
exit
_XcptFilter
_exit
memset
_cexit
__wgetmainargs
_amsg_exit
wcstok
memcpy
_wtoi
_vsnwprintf_s
_wcsicmp
_initterm_e
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
ole32
CoUninitialize
CoInitializeEx
webengine
IsRegisteredInProc
RemoveAspnetFromIISKey
IsMatchingBitness
CheckIISState
RunningOn64Bit
AspnetLoadResourceDLL
GetExistingVersion
RunAspnetCA
LoadResourceString
ValidateIISPath
RegisterScriptMapsOnVista
GrantAccessToUserAccountOnVista
GrantAccessToUserAccount
RegisterAspNetEx
UnregisterAspNet
RemoveClientScriptFiles
CopyClientScriptFiles
PrintStringToStdOut
CallManagedProtectedConfigAction
IsVista
PrintResourceString
SetRemoteConfigDCOMRegKeys
DetectErrorAndGetLogfileName
ListAspnetInstalledVersions
ListAspnetInstalledIISKeys
RunPkgmgr
PrintResourceStringNoNewLine
GetXSPHeap
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ