Static task
static1
Behavioral task
behavioral1
Sample
eab133a7301bedc67a48d0ff303e9e4f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eab133a7301bedc67a48d0ff303e9e4f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eab133a7301bedc67a48d0ff303e9e4f_JaffaCakes118
-
Size
322KB
-
MD5
eab133a7301bedc67a48d0ff303e9e4f
-
SHA1
c38f564fbd1a97165fb89c14d7557d0ff0d81b05
-
SHA256
04bc7b51aa15c703c20f1c38ef5a30efd746661578843bed7660de804027af99
-
SHA512
5d7ff5b1861b7b921ec6dce51e3fe19104fd09587a5440eea7badd62c6f4b263d7cc2aa0cee8f4b7c6adbc1c8f0a6feaf77470793a3e11a83b665ad58512dbf4
-
SSDEEP
6144:esp/iB85YqJSMk/K2PMBqJ7o6/Shhadm6+RGE/XPTZDEi:/JYqJSMkFMio6JdfAXbqi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eab133a7301bedc67a48d0ff303e9e4f_JaffaCakes118
Files
-
eab133a7301bedc67a48d0ff303e9e4f_JaffaCakes118.exe windows:4 windows x86 arch:x86
d72da975d565028c7d81d9ab81a10b9d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord516
ord665
DllFunctionCall
__vbaExceptHandler
ord711
ord712
ord607
ord608
ord717
ProcCallEngine
ord644
ord573
ord578
ord100
Sections
putos Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
todos Size: - Virtual size: 988B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
los Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
anti Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@irus Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pebundle Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE