Static task
static1
Behavioral task
behavioral1
Sample
d34f58d7ae3e089409767d348cec3490_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d34f58d7ae3e089409767d348cec3490_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d34f58d7ae3e089409767d348cec3490_JaffaCakes118
-
Size
291KB
-
MD5
d34f58d7ae3e089409767d348cec3490
-
SHA1
f2f19b72061620153dc00828ffcfbf601ed052a5
-
SHA256
c0b7a4e1815df5d9e8aaa3cdd3913bb8027b8a6183f0fe3547e3255302db79ec
-
SHA512
42bb76375924a25d32de7f3b3705f791b1e4e5472f3da4905a3c46c0d369b9f4ff0df5c55ee8ca800331bb1bdb2becd7e78a382a6a1797f4eb5faf13a8e1b943
-
SSDEEP
6144:OSWgDe4Ys1+uEHvSMEw7gb+VTLjSb2SJ7p6MR9cN4w51zm:/De3scuEaMEwDC2S9p6xKwXy
Malware Config
Signatures
Files
-
d34f58d7ae3e089409767d348cec3490_JaffaCakes118.exe windows:5 windows x86 arch:x86
d2fcd443875ee27bf190d083b3b0065c
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US7e:93:eb:fb:7c:c6:4e:59:ea:4b:9a:77:d4:06:fc:3bCertificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before21/12/2012, 00:00Not After30/12/2020, 23:59SubjectCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
0e:cf:f4:38:c8:fe:bf:35:6e:04:d8:6a:98:1b:1a:50Certificate
IssuerCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USNot Before18/10/2012, 00:00Not After29/12/2020, 23:59SubjectCN=Symantec Time Stamping Services Signer - G4,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
25:0c:e8:e0:30:61:2e:9f:2b:89:f7:05:4d:7c:f8:fdCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before08/11/2006, 00:00Not After07/11/2021, 23:59SubjectCN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
76:57:c3:39:eb:73:c7:6d:7d:f6:a2:ad:47:8e:66:e3Certificate
IssuerCN=VeriSign Class 3 Code Signing 2010 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)10,O=VeriSign\, Inc.,C=USNot Before28/08/2015, 00:00Not After26/09/2017, 23:59SubjectCN=Sogou.com,OU=Desktop Business Division,O=Sogou.com,L=Beijing,ST=Beijing,C=CNExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
3d:78:d7:f9:76:49:60:b2:61:7d:f4:f0:1e:ca:86:2aCertificate
IssuerCN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before10/12/2013, 00:00Not After09/12/2023, 23:59SubjectCN=Symantec Class 3 SHA256 Code Signing CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
52:00:e5:aa:25:56:fc:1a:86:ed:96:c9:d4:4b:33:c7Certificate
IssuerCN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before08/02/2010, 00:00Not After07/02/2020, 23:59SubjectCN=VeriSign Class 3 Code Signing 2010 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)10,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
D:\dll\SEmini\bin\Release\Explorer.exe.pdb
Imports
psapi
GetProcessImageFileNameW
kernel32
GetSystemTimeAsFileTime
CreateFileMappingW
OpenEventW
CreateEventW
CreateFileW
FindFirstFileW
FindClose
CreateDirectoryW
GetLastError
GetFileSize
ReadFile
WriteFile
GetVersionExW
GetCurrentProcess
GetModuleHandleW
QueryPerformanceCounter
InterlockedIncrement
lstrlenA
HeapAlloc
HeapFree
GetProcessHeap
LoadLibraryA
LocalAlloc
LocalFree
DeviceIoControl
CreateFileA
lstrcpyA
GetSystemDirectoryA
lstrcatA
CopyFileA
HeapReAlloc
GlobalAlloc
SetLastError
GlobalFree
OutputDebugStringA
SetEvent
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
RaiseException
FlushInstructionCache
ExitProcess
TerminateProcess
WaitForMultipleObjects
GetCurrentProcessId
GetFileAttributesW
GetTickCount
SetFilePointer
TerminateThread
InitializeCriticalSection
DeleteCriticalSection
InterlockedCompareExchange
GetModuleFileNameA
GetLocalTime
GetExitCodeThread
InterlockedExchangeAdd
CreateSemaphoreW
ReleaseSemaphore
FlushViewOfFile
SetStdHandle
GetConsoleMode
GetConsoleCP
RtlUnwind
GetTimeZoneInformation
LCMapStringW
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapCreate
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStdHandle
InterlockedDecrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStringTypeW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ExitThread
GetStartupInfoW
HeapSetInformation
GetCommandLineW
EncodePointer
DecodePointer
InterlockedPopEntrySList
IsProcessorFeaturePresent
InterlockedPushEntrySList
InitializeCriticalSectionAndSpinCount
VirtualFree
VirtualAlloc
CreateThread
CopyFileW
Sleep
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
FileTimeToSystemTime
SystemTimeToFileTime
FreeLibrary
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
CloseHandle
OpenProcess
lstrcatW
lstrcpyW
lstrlenW
QueryDosDeviceW
lstrcmpiW
GetLogicalDriveStringsW
GetProcAddress
LoadLibraryW
GetSystemTime
GetModuleFileNameW
WaitForSingleObject
CreateProcessW
DeleteFileW
GetTempPathW
WideCharToMultiByte
MultiByteToWideChar
WriteConsoleW
FlushFileBuffers
CompareStringW
SetEnvironmentVariableA
user32
SetWindowPos
ShowWindow
UnregisterClassA
wsprintfW
IsCharAlphaNumericW
wsprintfA
GetWindowLongW
SendMessageW
PostMessageW
GetMessageW
DestroyWindow
TranslateMessage
DispatchMessageW
RegisterClassExW
GetClassInfoExW
LoadCursorW
CreateWindowExW
SetWindowLongW
DefWindowProcW
IsWindow
SetTimer
PostQuitMessage
PostThreadMessageW
PeekMessageW
CallWindowProcW
advapi32
RegQueryValueExW
CloseEventLog
ReadEventLogW
GetOldestEventLogRecord
OpenEventLogW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
AllocateAndInitializeSid
CryptGetKeyParam
CryptDecrypt
CryptReleaseContext
CryptDestroyKey
CryptEncrypt
CryptSetKeyParam
CryptImportKey
CryptAcquireContextW
RegCreateKeyW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
shell32
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysStringLen
SysFreeString
SysAllocString
shlwapi
PathStripPathA
SHGetValueA
PathStripPathW
ws2_32
recvfrom
htonl
sendto
accept
listen
bind
send
recv
connect
closesocket
setsockopt
WSAGetLastError
socket
ntohl
inet_addr
gethostbyname
gethostname
ntohs
getsockname
htons
inet_ntoa
WSAStartup
wininet
HttpQueryInfoA
HttpEndRequestW
HttpSendRequestExA
HttpAddRequestHeadersW
HttpOpenRequestA
InternetConnectA
InternetOpenUrlA
InternetOpenA
InternetWriteFile
InternetReadFile
HttpQueryInfoW
InternetCloseHandle
InternetOpenUrlW
InternetOpenW
InternetGetLastResponseInfoA
HttpAddRequestHeadersA
HttpSendRequestA
InternetCrackUrlA
Sections
.text Size: 208KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 796B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ