Static task
static1
Behavioral task
behavioral1
Sample
ac458fa5e60df72a3df45e6edb74fc62_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ac458fa5e60df72a3df45e6edb74fc62_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac458fa5e60df72a3df45e6edb74fc62_JaffaCakes118
-
Size
315KB
-
MD5
ac458fa5e60df72a3df45e6edb74fc62
-
SHA1
a7902599c5e34870adc85c1621c4feb2affda2fb
-
SHA256
b314254af25a03c0b9c59b9b9b653e821471f3d02ee9e7e8e859786efbfd05ae
-
SHA512
8a4fdaf16018c6696de0ce3749e435721ff26f940aaf62cd08ec6e2c0c028cc686d34d9969fc1dee48fab4972d3c26365da90047a5c6b258d48bc1e926eebeae
-
SSDEEP
768:PYBcw/3DTAkNJ0zB5doS1PpYG62ZVdbpd3MyX4ZaozyPLT4sELzO4A35TpcrZ9j8:KcwHA36S1au3I0a/HWGxrFhusc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac458fa5e60df72a3df45e6edb74fc62_JaffaCakes118
Files
-
ac458fa5e60df72a3df45e6edb74fc62_JaffaCakes118.exe windows:4 windows x86 arch:x86
ee02c28872bb03da552922d0192027a7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord696
MethCallEngine
ord516
ord628
ord632
EVENT_SINK_AddRef
DllFunctionCall
ord563
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord608
ord717
ProcCallEngine
ord644
ord100
Sections
.text Size: 272KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.3NHqLN Size: 7B - Virtual size: 7B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ocupmH Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.PqOeC7 Size: 7B - Virtual size: 7B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ocupmH Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE