Static task
static1
Behavioral task
behavioral1
Sample
a80722a7376af11bb71a0a33fcc3c30b_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
a80722a7376af11bb71a0a33fcc3c30b_JaffaCakes118
-
Size
132KB
-
MD5
a80722a7376af11bb71a0a33fcc3c30b
-
SHA1
81ee7e15a660d25587891dba8c19fe04abeb9e3b
-
SHA256
1a587e418d83f06ad3502e05e146744967ca322a631e956ada19195454ab11ae
-
SHA512
36e570930419532131b1218440048660d71df4e798127c25bbd0471dc3a01db01dc4a2a513699725859e8c187c18cd33f1aee36e9600d144607bd35029731226
-
SSDEEP
1536:mpYmVLWiYu+HI3nExH9ObCOM9IWnNdf0Wf5HUtCT5E7dJd9uXXWMdBfVBdr73QlH:cY09OIWNd8u5GkfVBBy/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a80722a7376af11bb71a0a33fcc3c30b_JaffaCakes118
Files
-
a80722a7376af11bb71a0a33fcc3c30b_JaffaCakes118.exe windows:4 windows x86 arch:x86
a3a101a7014f0123fdd1429fa9ab177d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessW
ntdll
NtGetContextThread
NtSetContextThread
NtResumeThread
NtWriteVirtualMemory
NtUnmapViewOfSection
NtAllocateVirtualMemory
msvbvm60
ord583
ord584
ord516
ord660
ord593
ord594
ord520
VarPtr
ord632
DllFunctionCall
ord601
__vbaExceptHandler
ord608
ProcCallEngine
ord535
ord644
ord573
ord575
ord100
ord546
ord581
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ