Static task
static1
Behavioral task
behavioral1
Sample
75bd8c6e100a3a6af921cb549dd40537_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
75bd8c6e100a3a6af921cb549dd40537_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
75bd8c6e100a3a6af921cb549dd40537_JaffaCakes118
-
Size
100KB
-
MD5
75bd8c6e100a3a6af921cb549dd40537
-
SHA1
56c6f4927410ee15cefa58060e1e92786e128aa1
-
SHA256
d610aceff579439a4f153dd7752545228e64c640be9820b650a726240cfe54e8
-
SHA512
c3ca4a3d67b55190a79c894593e937d6e73336cddb6b1e2c50e7a1a5db7469cc87dff78577a669ecdda64e4586209a42d355b72f0ab98338b5363b26476871d9
-
SSDEEP
1536:dCNyvbZJAzdto7uMfP5yjsOsjhS8F4SY+A37feaCMJDmYsLIb4PvYqHB/Agu:W0bZGzduRP4jLs8c4SDADeak7dJHB/AH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 75bd8c6e100a3a6af921cb549dd40537_JaffaCakes118
Files
-
75bd8c6e100a3a6af921cb549dd40537_JaffaCakes118.exe windows:4 windows x86 arch:x86
df15a31cf9dc983504d051f126deaad3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaVarSub
__vbaStrI2
_CIcos
_adj_fptan
__vbaVarMove
__vbaStrI4
__vbaFreeVar
__vbaStrVarMove
__vbaLenBstr
__vbaFreeVarList
__vbaEnd
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
ord518
__vbaRecAnsiToUni
ord519
__vbaResume
__vbaStrCat
__vbaVarCmpNe
__vbaError
__vbaLsetFixstr
__vbaSetSystemError
__vbaHresultCheckObj
__vbaLenVar
_adj_fdiv_m32
__vbaAryDestruct
__vbaExitProc
__vbaVarForInit
__vbaOnError
__vbaObjSet
ord595
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
ord520
__vbaBoolVarNull
_CIsin
ord631
__vbaVarCmpGt
ord525
__vbaVargVarMove
__vbaChkstk
ord526
EVENT_SINK_AddRef
__vbaGenerateBoundsError
ord528
__vbaCyI2
__vbaStrCmp
__vbaVarTstEq
__vbaAryConstruct2
DllFunctionCall
__vbaVarOr
__vbaCySub
_adj_fpatan
__vbaLateIdCallLd
__vbaR8Cy
__vbaRecUniToAnsi
EVENT_SINK_Release
ord600
_CIsqrt
__vbaVarAnd
EVENT_SINK_QueryInterface
__vbaFpCmpCy
__vbaExceptHandler
__vbaStrToUnicode
ord712
ord606
_adj_fprem
_adj_fdivr_m64
ord607
ord608
__vbaFPException
__vbaInStrVar
__vbaStrVarVal
__vbaVarCat
__vbaDateVar
__vbaI2Var
__vbaStopExe
ord645
_CIlog
__vbaErrorOverflow
__vbaNew2
__vbaInStr
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
__vbaVarCmpLt
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord100
__vbaVarTstNe
__vbaI4Var
__vbaVarCmpEq
__vbaFpCy
__vbaLateMemCall
__vbaVarAdd
__vbaVarDup
__vbaStrToAnsi
__vbaFpI2
__vbaVarLateMemCallLd
__vbaFpI4
__vbaVarCopy
ord616
__vbaVarSetObjAddref
ord617
_CIatan
__vbaStrMove
__vbaCastObj
__vbaStrVarCopy
ord619
_allmul
_CItan
ord546
__vbaVarForNext
_CIexp
__vbaStrCy
__vbaFreeObj
__vbaFreeStr
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ