Static task
static1
Behavioral task
behavioral1
Sample
DCMI698754886.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
DCMI698754886.exe
Resource
win10v2004-20240709-en
General
-
Target
3b94b8707bb9c7901454553d4e7b39e0_JaffaCakes118
-
Size
4KB
-
MD5
3b94b8707bb9c7901454553d4e7b39e0
-
SHA1
9239d1f082ee51823fd1e0280f931c94bd6a895a
-
SHA256
9784b04157381060ced958551ecf7d383e7991ba57538461abd74ee58aeab9e3
-
SHA512
856958f2cf6c3a93ecd57e52f077059ee8bb2849594e0cbea8c564b596d37e88c2dad72558ada3c799002da24a9278b6746b9886ee37d9ca4c42163b5a852c87
-
SSDEEP
96:MUKG7bCXD8ySdgdg7hQW+QjiBxOu2i7GNlwWg0qzLuZ94hz:u8CX75diXw3R7GNl23AI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/DCMI698754886.exe
Files
-
3b94b8707bb9c7901454553d4e7b39e0_JaffaCakes118.zip
-
DCMI698754886.exe.exe windows:4 windows x86 arch:x86
376defe3878ab27ceeeb1225d1d170e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
__vbaVarMove
__vbaFreeVar
__vbaFreeVarList
_adj_fdiv_m64
_adj_fprem1
__vbaSetSystemError
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaOnError
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
__vbaBoolVar
_CIsin
__vbaChkstk
EVENT_SINK_AddRef
__vbaStrCmp
__vbaVarTstEq
__vbaObjVar
DllFunctionCall
_adj_fpatan
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
__vbaStrToUnicode
_adj_fprem
_adj_fdivr_m64
ord716
__vbaFPException
ord645
_CIlog
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
ord681
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaLateMemCall
__vbaVarDup
__vbaStrToAnsi
_CIatan
__vbaStrMove
_allmul
_CItan
_CIexp
__vbaFreeStr
__vbaFreeObj
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ