Static task
static1
Behavioral task
behavioral1
Sample
f9889cee52346d6273534b9fab8d407c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f9889cee52346d6273534b9fab8d407c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f9889cee52346d6273534b9fab8d407c_JaffaCakes118
-
Size
1.3MB
-
MD5
f9889cee52346d6273534b9fab8d407c
-
SHA1
9799fd8fece555c25a30ea317d97a98c776d8515
-
SHA256
d6aa2520bb5e3720a63d543e6c87a894e3f0ad811727f928ee88c5d5858b0df5
-
SHA512
062df77f94ec1418c0812fd5a9f51af0693368c19a41ac4b9998159c813cc91a13c198ec9594977c24736dd99ccddad5091b4c2b3d5e142aff49420607da36d7
-
SSDEEP
3072:q1hWtvGoM34o69AYlF0m4pL9SqUl5lQ4JgL04Tp/VpSqRYFmGHGCAW8T9FbNIbIP:qLWBzx/PUX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f9889cee52346d6273534b9fab8d407c_JaffaCakes118
Files
-
f9889cee52346d6273534b9fab8d407c_JaffaCakes118.exe windows:4 windows x86 arch:x86
1973ce4dc13892bc748cf60707c80662
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord518
ord626
ord660
ord666
ord593
ord594
ord598
ord632
EVENT_SINK_AddRef
ord560
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord607
ord608
ord531
ord716
ProcCallEngine
ord537
ord645
ord571
ord573
ord578
ord100
ord616
ord546
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE