Static task
static1
Behavioral task
behavioral1
Sample
743e1d5fdbfca47d1c1a9951a66800a1_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
743e1d5fdbfca47d1c1a9951a66800a1_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
743e1d5fdbfca47d1c1a9951a66800a1_JaffaCakes118
-
Size
504KB
-
MD5
743e1d5fdbfca47d1c1a9951a66800a1
-
SHA1
40e8f1022e4ac995bf12cfd44e3dd6026c2c31e5
-
SHA256
82f11a59e24ee498c13d6ab1a9ece99667548d6dd1bc4ecb00df4a499ce3a2dd
-
SHA512
c6ee4e201683318569ed88b3963dfa3d8894011662a611c4333c7caec003055e7126d1e4c863c057d8f00d87d989f0c92d5b39009ec0fee32cc478f31321bdcf
-
SSDEEP
6144:n5keg0DATu61ukqIzvzHQ1x8VzdaD+vZUSxoEr7wsj4zAvNdPJQ3PkgGSp8sHOyK:nWP0DmQAzvk8hgWjguaXlM0F
Malware Config
Signatures
Files
-
743e1d5fdbfca47d1c1a9951a66800a1_JaffaCakes118.exe windows:4 windows x86 arch:x86
56ea23e6677dc18e37cb5663df310c74
Code Sign
01Certificate
IssuerCN=Texas Instruments Incorporated,O=Telegram Messenger LLP,C=CZNot Before12/09/2018, 15:00Not After12/09/2019, 15:00SubjectCN=Texas Instruments Incorporated,O=Telegram Messenger LLP,C=CZ4e:b0:87:8f:cc:24:35:36:b2:d8:c9:f7:bf:39:55:77Certificate
IssuerCN=UTN-USERFirst-Object,OU=http://www.usertrust.com,O=The USERTRUST Network,L=Salt Lake City,ST=UT,C=USNot Before31/12/2015, 00:00Not After09/07/2019, 18:40SubjectCN=COMODO SHA-256 Time Stamping Signer,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
35:d7:9b:8c:80:2a:4a:b8:6d:9c:f0:b0:02:e3:a8:dd:e4:d0:da:c7:8f:47:0f:e4:d8:ba:4f:d1:bd:4d:6f:e3Signer
Actual PE Digest35:d7:9b:8c:80:2a:4a:b8:6d:9c:f0:b0:02:e3:a8:dd:e4:d0:da:c7:8f:47:0f:e4:d8:ba:4f:d1:bd:4d:6f:e3Digest Algorithmsha256PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
__vbaVarMove
__vbaFreeVar
__vbaStrVarMove
__vbaLenBstr
__vbaFreeVarList
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaStrCat
__vbaLsetFixstr
__vbaSetSystemError
__vbaRecDestruct
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaAryDestruct
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
_CIsin
ord631
__vbaChkstk
EVENT_SINK_AddRef
DllFunctionCall
__vbaLbound
_adj_fpatan
__vbaLateIdCallLd
__vbaRedim
ord678
EVENT_SINK_Release
__vbaUI1I2
_CIsqrt
EVENT_SINK_QueryInterface
__vbaVarMul
__vbaExceptHandler
ord711
__vbaStrToUnicode
ord713
_adj_fprem
_adj_fdivr_m64
ord609
__vbaFPException
ord537
_CIlog
__vbaErrorOverflow
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
__vbaDerefAry1
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaVarTstNe
__vbaI4Var
ord610
__vbaStrToAnsi
ord616
__vbaVarSetObjAddref
_CIatan
__vbaStrMove
ord540
__vbaI4Cy
ord650
_allmul
_CItan
_CIexp
__vbaFreeObj
__vbaFreeStr
Sections
.text Size: 464KB - Virtual size: 460KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ