Static task
static1
Behavioral task
behavioral1
Sample
b6a85df4a0a05d1847974323557750f2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b6a85df4a0a05d1847974323557750f2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6a85df4a0a05d1847974323557750f2_JaffaCakes118
-
Size
24KB
-
MD5
b6a85df4a0a05d1847974323557750f2
-
SHA1
ccb2fdd12aef826c79bdf374b204505053b382eb
-
SHA256
20da2bec7edd11007ccdfd18ade30ee08efbcea1d147860d630aca2174217e58
-
SHA512
05ec56c2aeb339b39025802cb9695dfb23ee65751476c9e47a4f8ff1960eaa298f61a701685d4d7be2c3b6a6bb15452231f5b3ade903d8344b620f70235fb368
-
SSDEEP
192:/TRsitxjDObotjcgTa43ZzRYqLRtvqp9FuffAnR6wIwM6KaFWUI:/TRsitxeq5B36cHAnnWUI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6a85df4a0a05d1847974323557750f2_JaffaCakes118
Files
-
b6a85df4a0a05d1847974323557750f2_JaffaCakes118.exe windows:4 windows x86 arch:x86
99844f44b0d80ce35078e0399c421308
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
__vbaVarMove
__vbaFreeVar
_adj_fdiv_m64
_adj_fprem1
__vbaSetSystemError
_adj_fdiv_m32
__vbaAryDestruct
_adj_fdiv_m16i
_adj_fdivr_m16i
_CIsin
__vbaChkstk
__vbaFileClose
EVENT_SINK_AddRef
__vbaGenerateBoundsError
__vbaAryConstruct2
DllFunctionCall
_adj_fpatan
__vbaRedim
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaFPException
__vbaGetOwner3
__vbaI2Var
ord644
_CIlog
__vbaFileOpen
ord648
ord570
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaFpCy
__vbaAryLock
_CIatan
_allmul
_CItan
__vbaAryUnlock
_CIexp
__vbaFreeStr
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ