Static task
static1
Behavioral task
behavioral1
Sample
66f066597bd45e246e90d53026d48a0f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
66f066597bd45e246e90d53026d48a0f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
66f066597bd45e246e90d53026d48a0f_JaffaCakes118
-
Size
543KB
-
MD5
66f066597bd45e246e90d53026d48a0f
-
SHA1
bdfff3851aa4e654399452e8ec963b413e9d5551
-
SHA256
059cbe7004d62e0a12928f7d5e77e5ae72a09d36d01862f38694aea552de839d
-
SHA512
5deb9aa7c3e84d4a25dedb1e5bccfc57906e8fdfd16c82f00556aac48d8011ec6f9ef4f3d214fb6990afbc1f2dab7750239960ae31ccb9ba37c1ea6503f5d6e4
-
SSDEEP
6144:bhPBarKpkt7WiO7KlxEiaNXcBJ/nzpzSC3Wbx2i+y6dFy4KFy8E:FPwrjt787d+zB3WbQjy4KA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66f066597bd45e246e90d53026d48a0f_JaffaCakes118
Files
-
66f066597bd45e246e90d53026d48a0f_JaffaCakes118.exe windows:4 windows x86 arch:x86
375c7402f8748b0ff0440c4212cdf8d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ExitProcess
GetModuleHandleA
msvbvm60
__vbaVarSub
Sections
pec1 Size: 22KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crsrc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.T� Size: 232KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oojzfbb Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 171KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE