Static task
static1
Behavioral task
behavioral1
Sample
SuperAdBlocker.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
SuperAdBlocker.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
keygen.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
keygen.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
新云软件.url
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
d1eea40e476d312bc3e626ce77602fd6_JaffaCakes118
-
Size
5.2MB
-
MD5
d1eea40e476d312bc3e626ce77602fd6
-
SHA1
e311187f4de5833487847dd95e0a48835aff65de
-
SHA256
b1e88f92e73fd0a3192f02b233bd348e4ae3400a8ad2b6741c6496c60bf9dcd2
-
SHA512
c1253b123e9d67b8230c7e2cf81d5714943c5d008b1015d3306596bebacccd057bf431cf6ec00f18a9e81a5e8478b227406d0c777b3b4ebbdc07627196c36b4f
-
SSDEEP
98304:Tw4LJvegp1ACd6vLx4nz/JbYNIadESoPF9Sq9CgxwcIqhuoq/QXuLJot/:UsphAC+xCz/JzadE3PznCllOt/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/keygen.exe
Files
-
d1eea40e476d312bc3e626ce77602fd6_JaffaCakes118.rar
-
SuperAdBlocker.exe.exe windows:4 windows x86 arch:x86
8b6130a51e22ee5ae74880b8b58d6211
Code Sign
01Certificate
IssuerCN=Thawte Premium Server CA,OU=Certification Services Division,O=Thawte Consulting cc,L=Cape Town,ST=Western Cape,C=ZA,1.2.840.113549.1.9.1=#0c197072656d69756d2d736572766572407468617774652e636f6dNot Before01/08/1996, 00:00Not After31/12/2020, 23:59SubjectCN=Thawte Premium Server CA,OU=Certification Services Division,O=Thawte Consulting cc,L=Cape Town,ST=Western Cape,C=ZA,1.2.840.113549.1.9.1=#0c197072656d69756d2d736572766572407468617774652e636f6d0aCertificate
IssuerCN=Thawte Premium Server CA,OU=Certification Services Division,O=Thawte Consulting cc,L=Cape Town,ST=Western Cape,C=ZA,1.2.840.113549.1.9.1=#0c197072656d69756d2d736572766572407468617774652e636f6dNot Before06/08/2003, 00:00Not After05/08/2013, 23:59SubjectCN=Thawte Code Signing CA,O=Thawte Consulting (Pty) Ltd.,C=ZAExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
16:62:39:66:f0:79:4d:5c:be:46:a1:23:c6:8c:7b:39Certificate
IssuerCN=Thawte Code Signing CA,O=Thawte Consulting (Pty) Ltd.,C=ZANot Before23/04/2007, 00:00Not After11/05/2009, 23:59SubjectCN=SuperAdBlocker.com,OU=SECURE APPLICATION DEVELOPMENT,O=SuperAdBlocker.com,L=Eugene,ST=Oregon,C=USExtended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSACleanup
WSAStartup
send
socket
htons
connect
WSAAsyncSelect
WSAGetLastError
shutdown
recv
setsockopt
closesocket
ioctlsocket
gethostbyname
kernel32
lstrcpyA
lstrlenA
_lwrite
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
_lclose
GetProcAddress
LoadLibraryA
_lcreat
GetPrivateProfileStringA
GetPrivateProfileIntA
GlobalLock
GlobalAlloc
GlobalFree
GlobalUnlock
GetTempFileNameA
lstrcatA
FreeLibrary
DeleteFileA
_llseek
lstrcmpA
_lread
GetCommandLineA
CloseHandle
GetFileTime
CreateFileA
FreeResource
LockResource
LoadResource
SizeofResource
FindResourceA
GetExitCodeProcess
WaitForSingleObject
GetModuleFileNameA
CreateDirectoryA
GetSystemDirectoryA
GetVersionExA
MulDiv
GetUserDefaultLangID
SetCurrentDirectoryA
lstrcmpiA
ExpandEnvironmentStringsA
Sleep
GetFileSize
ExitProcess
_lopen
SetEnvironmentVariableA
GetModuleHandleA
SetErrorMode
GetTempPathA
GetCurrentProcess
user32
GetDC
MessageBoxA
DestroyWindow
CharNextA
LoadStringA
SendMessageA
GetDlgItem
EnumChildWindows
ReleaseDC
EndDialog
GetDlgItemTextA
wsprintfA
SetDlgItemTextA
CreateDialogParamA
ExitWindowsEx
EnableWindow
ShowWindow
SetTimer
DialogBoxParamA
TranslateMessage
DispatchMessageA
SetWindowTextA
PeekMessageA
gdi32
GetDeviceCaps
DeleteObject
CreateFontA
advapi32
LookupPrivilegeValueA
RegDeleteValueA
RegEnumValueA
OpenSCManagerA
CloseServiceHandle
OpenProcessToken
RegCloseKey
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
RegQueryValueA
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteExA
Exports
Exports
_LanguageDlg@16
_PasswordDlg@16
_ProgressDlg@16
_UpdateCRC@8
_t1@40
_t2@12
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.WISE Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
keygen.exe.exe windows:4 windows x86 arch:x86
0a189ea27c7df60e84d4a97ea9036db8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetCapture
SendMessageA
SetWindowTextA
ReleaseCapture
GetWindowRect
GetDlgItem
GetCursorPos
EndDialog
DialogBoxParamA
SetWindowPos
wsprintfA
kernel32
RtlZeroMemory
GetVolumeInformationA
GetTickCount
GetModuleHandleA
GetCommandLineA
ExitProcess
lstrlenA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 392B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
新云软件.url.url