Static task
static1
Behavioral task
behavioral1
Sample
Vural tto.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Vural tto.exe
Resource
win10v2004-20241007-en
General
-
Target
398b4977f768a462e8527c6dfa798aeb_JaffaCakes118
-
Size
146KB
-
MD5
398b4977f768a462e8527c6dfa798aeb
-
SHA1
38c2fa64a620e4530f51ae5f2a5caa5e6d828d75
-
SHA256
dc7167503215bc2f187b8053cb44085a5bc1ec278d0734b4892635b0ed083d7f
-
SHA512
88f54111552ff20a812f37d8493858995ba942286b449183250af3a929859fb6cbe104820f1b3bd1bb97a1ddacb8f4f47a14cd9f8849d8b8f588a986fd877fc0
-
SSDEEP
3072:PpJ2NU+nZd6yEhs7ZM3qegA8pexqVyxLkXxpUcHHuOhswdNTL:PnkvnZd6yjhvaxqoxLSxpUGs2TL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Vural tto.EXE
Files
-
398b4977f768a462e8527c6dfa798aeb_JaffaCakes118.rar
-
Vural tto.EXE.exe windows:4 windows x86 arch:x86
20da04889d56cd85f66a5a521e4a08d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord631
ord632
EVENT_SINK_AddRef
ord561
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord717
ProcCallEngine
ord537
ord644
ord681
ord685
ord100
ord616
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ