Static task
static1
Behavioral task
behavioral1
Sample
aaf06b6ad0baa02335a22328ddaba067_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aaf06b6ad0baa02335a22328ddaba067_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aaf06b6ad0baa02335a22328ddaba067_JaffaCakes118
-
Size
424KB
-
MD5
aaf06b6ad0baa02335a22328ddaba067
-
SHA1
98e19ca8174b23a42da0f880dc99523a98856745
-
SHA256
ded3e9ffb8d83db3b2117ebe473c802b4150d381749e010ebdb821ccf3f973e6
-
SHA512
6a81c80e162dd49a9f081e924eb0e1d03fac51b58e69eaa4499524399da73cd537567464f05f7b3f6b7c1341b071d7dac6f879702ee876b2616334cbb217f9e2
-
SSDEEP
6144:6UAifuWI91r96cr18zo0naGDU2RfS15YNNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:P9uWIt6S8PaGY2ESNxDIBuOFe7/uT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aaf06b6ad0baa02335a22328ddaba067_JaffaCakes118
Files
-
aaf06b6ad0baa02335a22328ddaba067_JaffaCakes118.exe windows:4 windows x86 arch:x86
ea23fc29d95be057d4e7c6b77d74a60d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord626
ord595
ord598
ord526
EVENT_SINK_AddRef
ord528
ord529
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord608
ord716
ProcCallEngine
ord535
ord645
ord570
ord571
ord576
ord100
ord617
ord581
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cpa Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adate Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE