Static task
static1
Behavioral task
behavioral1
Sample
ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee702697678035626ed75f89fa7bcdb5_JaffaCakes118
-
Size
262KB
-
MD5
ee702697678035626ed75f89fa7bcdb5
-
SHA1
8f3a29e20470462d2cf1f66bcc14b6d90ebfc605
-
SHA256
08bd4c6afb3cf682b949bc4b1853a2e98b14d37569dd61d21724e6cc0c75ef53
-
SHA512
e23981d512c2892097d502cd9da929a34e9f2e824ccaaca5cb7c11bccb425f6a33247db042fb9cf9eb323e99909647312687234220ba759ab7014e81b2abffae
-
SSDEEP
6144:lqCbbe+R6SjMbnysLWN682NCYRDXlcTwgLnJF8UF7w68q5:pbe+IlbnBiNHYDVYwgLJFNF
Malware Config
Signatures
Files
-
ee702697678035626ed75f89fa7bcdb5_JaffaCakes118.exe windows:4 windows x86 arch:x86
2fcdd769df6e3b8cfa2779323dbb9076
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29-01-1996 00:00Not After01-08-2028 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15-06-2007 00:00Not After14-06-2012 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04-12-2003 00:00Not After03-12-2013 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
1c:2d:d6:1a:35:e6:5d:f6:29:97:01:ff:9b:e5:ca:44Certificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before20-01-2010 00:00Not After24-01-2012 23:59SubjectCN=BITDEFENDER LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=BITDEFENDER LLC,L=Fort Lauderdale,ST=Florida,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21-05-2009 00:00Not After20-05-2019 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
f3:e9:16:07:07:24:3a:b2:65:b5:0f:80:95:20:03:a6:55:0a:c9:4dSigner
Actual PE Digestf3:e9:16:07:07:24:3a:b2:65:b5:0f:80:95:20:03:a6:55:0a:c9:4dDigest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMailslotA
lstrcmp
SetPriorityClass
GetProcAddress
OpenEventW
CreateSemaphoreW
GetLastError
LoadLibraryA
GetWindowsDirectoryA
VirtualAlloc
GetCurrentThreadId
IsBadCodePtr
user32
GetCapture
DestroyMenu
SendMessageW
UpdateWindow
CreateWindowExA
GetFocus
GetClassInfoW
DefWindowProcW
GetDlgItem
GetMenuItemID
ArrangeIconicWindows
GetWindowTextW
CreateAcceleratorTableW
GetDC
EnumChildWindows
EnumDesktopWindows
GetAsyncKeyState
GetMenuStringW
MoveWindow
CharUpperW
EnableWindow
SetCursorPos
GetCaretPos
GetWindowRect
GetKeyState
PeekMessageA
InvalidateRgn
GetWindowTextA
TrackPopupMenu
GetMenuItemInfoW
CheckMenuItem
gdi32
GetRandomRgn
MoveToEx
BitBlt
SetBitmapDimensionEx
StartPage
GetColorSpace
PolylineTo
EnumEnhMetaFile
GetCharABCWidthsFloatA
SetAbortProc
ExtEscape
PatBlt
AddFontResourceW
GetDCPenColor
CreateDIBSection
SetViewportExtEx
SetMiterLimit
CopyEnhMetaFileW
advapi32
RegOpenKeyExW
RegRestoreKeyW
RegOpenKeyExA
RegReplaceKeyW
RegEnumValueW
opengl32
glBegin
ws2_32
WSACleanup
WSAEnumNetworkEvents
gethostbyname
select
getprotobynumber
bind
recv
connect
WSASendTo
Sections
.GKPTv Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.wLBIa Size: 1024B - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.b Size: 1024B - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Dl Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.HbgW Size: 1KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.axiPP Size: 512B - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.VguY Size: 2KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.MrZmI Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.T Size: 1KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pEn Size: 2KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.peO Size: 1024B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.QyoMA Size: 1024B - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 222KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 806B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ