Static task
static1
Behavioral task
behavioral1
Sample
0fd7147061993499f8fb5e90036c9419_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0fd7147061993499f8fb5e90036c9419_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0fd7147061993499f8fb5e90036c9419_JaffaCakes118
-
Size
252KB
-
MD5
0fd7147061993499f8fb5e90036c9419
-
SHA1
ad246637512104d3894307eac7c657f5cb2363cd
-
SHA256
92631d58f8485816dda6b11a76a1f0cb7e609805a615a2aad0a487edafa58411
-
SHA512
95ceacb89156c440bd637186cf90e782120ff730c459d9ea85220867d33134618e1e58e62c9fed43f987da891c6ab777b318baaeaa012de6f74a4bf01a5efef8
-
SSDEEP
1536:37Xqd8RQSqzsRybL/QTv88vblBSk+IKWye8FGwyHXy1TP/s96cT1:D1gzsRybL/QTv88vblBfKWyZKQE1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fd7147061993499f8fb5e90036c9419_JaffaCakes118
Files
-
0fd7147061993499f8fb5e90036c9419_JaffaCakes118.exe windows:4 windows x86 arch:x86
9b14707620401d9e669d7a3368c5522c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtGetContextThread
NtSetContextThread
NtResumeThread
NtWriteVirtualMemory
NtUnmapViewOfSection
NtAllocateVirtualMemory
shell32
ShellExecuteW
kernel32
GetFileAttributesW
DeleteFileW
CreateProcessW
GetModuleFileNameW
GetSystemDirectoryW
CopyFileW
Sleep
SetFileAttributesW
CreateDirectoryW
GetEnvironmentVariableW
user32
CallWindowProcW
FindWindowW
PostMessageW
urlmon
URLDownloadToFileW
msvbvm60
ord582
ord584
ord516
ord660
ord593
ord520
ord631
ord632
ord525
ord526
DllFunctionCall
__vbaExceptHandler
ord608
ProcCallEngine
ord644
ord537
ord573
ord100
ord546
ord581
Sections
.text Size: 224KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE