Static task
static1
Behavioral task
behavioral1
Sample
4415240f5f2038308241aaef6f4ec8a4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4415240f5f2038308241aaef6f4ec8a4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4415240f5f2038308241aaef6f4ec8a4_JaffaCakes118
-
Size
96KB
-
MD5
4415240f5f2038308241aaef6f4ec8a4
-
SHA1
43b724128b3f61dd744795ba902518e125793e4f
-
SHA256
1462709c8f043262a3e855cc8ec6b72b1f9a8aa577e017c2bdda5f8626b3bd23
-
SHA512
fd1e13531594ef0ac988b720a5a972dd15a51094e2478599097cc7d186d8f78c7edb11c9d3691faa35d4339a072bdb399fdacc3c6ab2c046aa17f66c6208800b
-
SSDEEP
1536:30Wes66K8GwElIywaapkVX1Q8506Gc2o0zW9:les66K8GMyzDJ506d2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4415240f5f2038308241aaef6f4ec8a4_JaffaCakes118
Files
-
4415240f5f2038308241aaef6f4ec8a4_JaffaCakes118.exe windows:4 windows x86 arch:x86
82e3cb84a9bd45ec57373531f3cced7f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
kernel32
WaitForSingleObject
CreateEventW
SetEvent
CloseHandle
msvbvm60
EVENT_SINK_GetIDsOfNames
ord693
ord694
ord698
MethCallEngine
EVENT_SINK_Invoke
ord516
Zombie_GetTypeInfo
ord592
ord593
ord594
ord595
ord598
ord520
ord631
ord632
ord525
EVENT_SINK_AddRef
ord529
ord561
DllFunctionCall
ord563
Zombie_GetTypeInfoCount
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord710
ord711
ord712
ord606
ord714
ord608
ord717
ord319
ProcCallEngine
ord537
ord644
ord570
ord573
ord681
ord685
ord100
ord320
ord321
ord616
ord617
ord618
ord650
ord546
ord580
ord581
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ