Static task
static1
Behavioral task
behavioral1
Sample
16cbd2f60a3d879e35245609d5a9d6ea_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
16cbd2f60a3d879e35245609d5a9d6ea_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
16cbd2f60a3d879e35245609d5a9d6ea_JaffaCakes118
-
Size
273KB
-
MD5
16cbd2f60a3d879e35245609d5a9d6ea
-
SHA1
4efc9c03dff1c8b0915b99309d8e6c5d1a01a07b
-
SHA256
7b7d1fb15740e9bc3fe9a3aae0b3469aa00c90a0b57fc3d795c0a63b53afc8a9
-
SHA512
fe98501d2cc383377462e469e5795b6ce3ab41e5252e97bdc6cea76d1959ae64cc43844e61e0e2c3afab55d6abee35aa0d7d6dfb085e299e5689ec6564baaf28
-
SSDEEP
6144:JukBMqdK7gLsl0bffNDe4w/6XcRW8ZcF3UiZdQV:4kBMkVAMTw/gcRtZooV
Malware Config
Signatures
Files
-
16cbd2f60a3d879e35245609d5a9d6ea_JaffaCakes118.exe windows:4 windows x86 arch:x86
4403e5d1ed86dff7a6e72623c8c61751
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
1c:2d:d6:1a:35:e6:5d:f6:29:97:01:ff:9b:e5:ca:44Certificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before20/01/2010, 00:00Not After24/01/2012, 23:59SubjectCN=BITDEFENDER LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=BITDEFENDER LLC,L=Fort Lauderdale,ST=Florida,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21/05/2009, 00:00Not After20/05/2019, 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
27:b3:98:0c:f3:2d:30:a9:d1:2c:71:cf:68:d7:b3:85:20:43:29:f2Signer
Actual PE Digest27:b3:98:0c:f3:2d:30:a9:d1:2c:71:cf:68:d7:b3:85:20:43:29:f2Digest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
CreateFileMappingW
IsBadReadPtr
GetACP
GetHandleInformation
CreateMutexW
GetUserDefaultLCID
IsBadWritePtr
GetSystemDefaultLangID
ConnectNamedPipe
GlobalAlloc
GetFullPathNameW
SetLocaleInfoA
GetCurrentDirectoryW
user32
MonitorFromRect
ShowCaret
DefFrameProcA
DefFrameProcW
TrackPopupMenuEx
CopyIcon
GetMenuItemInfoA
GetCaretPos
SetTimer
CharLowerA
InsertMenuItemW
ClientToScreen
GetClassLongW
PeekMessageW
GetDC
SetWindowRgn
PeekMessageA
LoadMenuW
InsertMenuW
SetWindowPos
LoadMenuIndirectW
EnumDesktopWindows
DefDlgProcW
CharNextW
SetWindowTextW
GetClassInfoExW
gdi32
CreateFontIndirectExW
SetBitmapBits
StrokeAndFillPath
GetTextCharsetInfo
FillRgn
GetDCBrushColor
GetViewportOrgEx
DeleteColorSpace
SetDIBits
CloseMetaFile
advapi32
RegOpenKeyExA
RegDeleteKeyA
RegRestoreKeyA
RegCreateKeyExA
shlwapi
SHSetThreadRef
SHReleaseThreadRef
PathIsNetworkPathA
PathIsContentTypeA
SHRegSetUSValueW
PathParseIconLocationW
SHRegDeleteEmptyUSKeyW
StrFromTimeIntervalW
ole32
OleLoad
CreateFileMoniker
OleUninitialize
GetClassFile
CLSIDFromString
opengl32
wglCreateLayerContext
glRotatef
glRasterPos3dv
glGetLightiv
glTexCoord4iv
glReadPixels
glRenderMode
GlmfEndPlayback
glMap1f
glPolygonMode
glTexGeni
glColor4f
glVertex4f
setupapi
SetupQueryInfOriginalFileInformationW
SetupBackupErrorW
SetupDiCreateDeviceInfoListExW
pSetupMalloc
CM_Enumerate_Classes
pSetupDoesUserHavePrivilege
SetupCloseFileQueue
SetupDiOpenDeviceInterfaceRegKey
SetupInstallFileExW
pSetupWriteLogError
pSetupStringTableStringFromIdEx
ws2_32
setsockopt
getsockopt
getservbyport
WSAAccept
wininet
ReadUrlCacheEntryStream
RetrieveUrlCacheEntryFileW
GopherGetAttributeA
InternetCombineUrlW
LoadUrlCacheContent
InternetSetOptionExA
GopherCreateLocatorW
winspool.drv
DeletePrinter
OpenPrinterA
wsock32
EnumProtocolsA
WSAUnhookBlockingHook
gethostbyname
SetServiceW
bind
GetAddressByNameA
ntohs
WSASetLastError
closesocket
rexec
AcceptEx
__WSAFDIsSet
GetServiceA
inet_network
WSACancelBlockingCall
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.YGVjIG Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.NJZ Size: 4KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.IFrfs Size: 2KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jAd Size: 512B - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yRn Size: 1024B - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.qfE Size: 1KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.j Size: 512B - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ