Static task
static1
Behavioral task
behavioral1
Sample
523d57d6dac307e88ed59d18abbf12a2_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
523d57d6dac307e88ed59d18abbf12a2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
523d57d6dac307e88ed59d18abbf12a2_JaffaCakes118
-
Size
61KB
-
MD5
523d57d6dac307e88ed59d18abbf12a2
-
SHA1
15971a57d00ccfee6c5ff32fc173058a9692ee86
-
SHA256
e2344b34c71b1d0ada163eb7abea6bdd54eec13a6a64b245173a4e98d1fbd203
-
SHA512
20f9b8ea76b7cce4a912a9a5788dd293c432819602f3a6999131948171d5ffab8d1548eb1b439d811aced28c9aa9c5c87469ae275c891e4564c2e4aff29da440
-
SSDEEP
1536:wWW8+koBjW9J25oZNPkHgQ6NkJMC0JHgpu1kD:hW8+ko1W9KoZhk/c4u1kD
Malware Config
Signatures
Files
-
523d57d6dac307e88ed59d18abbf12a2_JaffaCakes118.exe windows:5 windows x86 arch:x86
4ce55906a9f9f1453dd3da70508fa3bf
Code Sign
c1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10/01/1997, 07:00Not After31/12/2020, 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporationc1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10/01/1997, 07:00Not After31/12/2020, 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporation61:47:52:ba:00:00:00:00:00:04Certificate
IssuerCN=Microsoft Timestamping PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before16/09/2006, 01:53Not After16/09/2011, 02:03SubjectCN=Microsoft Timestamping Service,OU=nCipher DSE ESN:D8A9-CFCC-579C,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
61:47:52:ba:00:00:00:00:00:04Certificate
IssuerCN=Microsoft Timestamping PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before16/09/2006, 01:53Not After16/09/2011, 02:03SubjectCN=Microsoft Timestamping Service,OU=nCipher DSE ESN:D8A9-CFCC-579C,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
6a:0b:99:4f:c0:00:25:ab:11:db:45:1f:58:7a:67:a2Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before16/09/2006, 01:04Not After15/09/2019, 07:00SubjectCN=Microsoft Timestamping PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:02:30:7e:00:00:00:00:00:06Certificate
IssuerCN=Microsoft Windows Verification Intermediate PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before10/03/2008, 21:57Not After10/06/2009, 22:07SubjectCN=Microsoft Windows Component Publisher,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
6a:0b:99:4f:c0:00:1b:ab:11:da:3a:a1:b6:df:ec:88Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before11/10/2005, 21:55Not After26/04/2010, 07:00SubjectCN=Microsoft Windows Verification Intermediate PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
8e:3d:cd:26:06:8f:22:d3:b3:1b:d7:0a:b0:4c:08:21:e1:4b:e4:1bSigner
Actual PE Digest8e:3d:cd:26:06:8f:22:d3:b3:1b:d7:0a:b0:4c:08:21:e1:4b:e4:1bDigest Algorithmsha1PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GetWindowsDirectoryA
GetVolumeInformationA
CreateDirectoryA
GetVersionExA
GetModuleHandleA
FindResourceA
LoadResource
LockResource
GlobalAlloc
GetSystemDirectoryA
GetFileInformationByHandle
HeapAlloc
GetProcessHeap
ReadFile
HeapFree
lstrcpyA
IsBadReadPtr
WriteFile
CreateFileA
LocalFree
CloseHandle
DeleteFileA
GetCurrentProcess
GetProcAddress
FreeResource
LoadLibraryA
user32
wsprintfA
advapi32
GetUserNameA
RegCloseKey
RegSetValueExA
RegRestoreKeyA
RegCreateKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetEntriesInAclA
SetSecurityInfo
GetSecurityInfo
ntdll
ZwCreateSymbolicLinkObject
memcpy
memset
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 296B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ