Static task
static1
Behavioral task
behavioral1
Sample
b13da3e90142733c584dd472bd58acae_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b13da3e90142733c584dd472bd58acae_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
b13da3e90142733c584dd472bd58acae_JaffaCakes118
-
Size
836KB
-
MD5
b13da3e90142733c584dd472bd58acae
-
SHA1
b61e8ea9dffd92da30ed9b43e83c2990749ee07d
-
SHA256
86697d53be7f240a468d9dd9b7f0da75c120452fbda7e808cae3e571394b8b2d
-
SHA512
2c554f28201dc13286df627ba2190d9e4545c0b403e81e9c0af0b8a53d582a44bace9b2207749f1099ca4450894ad5a3ff6a6defaf82ac594165fe1803f5da82
-
SSDEEP
6144:0pzOlcLF0SNHwIslstKtpia6LutwRchtXB4Lp3/b+bgjTC8TS:6q7ma6ywRcPX2QbgHC8T
Malware Config
Signatures
Files
-
b13da3e90142733c584dd472bd58acae_JaffaCakes118.exe windows:4 windows x86 arch:x86
82032299911209b44d120606f4c6b429
Code Sign
01Certificate
IssuerCN=Texas Instruments Incorporated,O=Telegram Messenger LLP,C=CZNot Before12/09/2018, 15:00Not After12/09/2019, 15:00SubjectCN=Texas Instruments Incorporated,O=Telegram Messenger LLP,C=CZ4e:b0:87:8f:cc:24:35:36:b2:d8:c9:f7:bf:39:55:77Certificate
IssuerCN=UTN-USERFirst-Object,OU=http://www.usertrust.com,O=The USERTRUST Network,L=Salt Lake City,ST=UT,C=USNot Before31/12/2015, 00:00Not After09/07/2019, 18:40SubjectCN=COMODO SHA-256 Time Stamping Signer,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
e2:a0:3b:b1:dc:ab:84:f8:29:9a:5a:c7:d3:c9:ea:9f:d2:18:cb:b1:0e:1d:48:0f:62:82:5b:69:bf:97:47:a3Signer
Actual PE Digeste2:a0:3b:b1:dc:ab:84:f8:29:9a:5a:c7:d3:c9:ea:9f:d2:18:cb:b1:0e:1d:48:0f:62:82:5b:69:bf:97:47:a3Digest Algorithmsha256PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
__vbaVarMove
__vbaFreeVar
__vbaCyMul
__vbaStrVarMove
__vbaLenBstr
__vbaFreeVarList
_adj_fdiv_m64
__vbaFreeObjList
ord516
ord517
_adj_fprem1
ord519
__vbaStrCat
__vbaSetSystemError
ord661
__vbaRecDestruct
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaAryDestruct
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
_CIsin
ord631
ord525
__vbaChkstk
EVENT_SINK_AddRef
__vbaAryConstruct2
DllFunctionCall
ord563
__vbaLbound
ord673
_adj_fpatan
__vbaLateIdCallLd
__vbaRedim
EVENT_SINK_Release
__vbaUI1I2
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
__vbaStrToUnicode
_adj_fprem
_adj_fdivr_m64
ord609
__vbaFPException
ord537
_CIlog
ord646
__vbaErrorOverflow
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
ord575
__vbaDerefAry1
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaI4Var
ord610
__vbaStrToAnsi
__vbaStrComp
__vbaVarSetObjAddref
_CIatan
__vbaStrMove
ord540
__vbaI4Cy
ord650
_allmul
_CItan
_CIexp
__vbaFreeObj
__vbaFreeStr
Sections
.text Size: 460KB - Virtual size: 458KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 364KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ