Static task
static1
Behavioral task
behavioral1
Sample
85ef4d2c4d482b353c237e1145fc52bd_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
85ef4d2c4d482b353c237e1145fc52bd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
85ef4d2c4d482b353c237e1145fc52bd_JaffaCakes118
-
Size
225KB
-
MD5
85ef4d2c4d482b353c237e1145fc52bd
-
SHA1
ce8e66d056a7093e5d89c0249d713a5a00084b3f
-
SHA256
7c113db245bdcc7da302e5c36e7c340e8467dc91cb9576a3ffb479575ad21b71
-
SHA512
7fc4727afd184b9788dd85120ab1c327c40e338a32b27b67302689d5d6d9f7dbbbd9529d79e51b8ea5e069189af3807ad8fab4a98d5c86aff5d987fea3de718f
-
SSDEEP
1536:zrdTtOCRO0YOWAMyCAOzcbQ9jt+TWiUb69pZBsAYDyB7jV+q3hs1+o:fxtfRYyNOzcbmSi+ZB8DyB7sZko
Malware Config
Signatures
Files
-
85ef4d2c4d482b353c237e1145fc52bd_JaffaCakes118.exe windows:4 windows x86 arch:x86
6b2c11cfb39c06809475cfa1f065a769
Code Sign
Certificate
IssuerCN=logerende,OU=naadelses,O=Thalia,L=Gtem,ST=xylophon,C=BB,1.2.840.113549.1.9.1=#0c14456e6b69696e3240736d616174696e672e507265Not Before11-08-2021 10:55Not After11-08-2022 10:55SubjectCN=logerende,OU=naadelses,O=Thalia,L=Gtem,ST=xylophon,C=BB,1.2.840.113549.1.9.1=#0c14456e6b69696e3240736d616174696e672e5072657b:05:b1:d4:49:68:51:44:f7:c9:89:d2:9c:19:9d:12Certificate
IssuerCN=VeriSign Universal Root Certification Authority,OU=VeriSign Trust Network+OU=(c) 2008 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before12-01-2016 00:00Not After11-01-2031 23:59SubjectCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
7b:d4:e5:af:ba:cc:07:3f:a1:01:23:04:22:41:4d:12Certificate
IssuerCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USNot Before23-12-2017 00:00Not After22-03-2029 23:59SubjectCN=Symantec SHA256 TimeStamping Signer - G3,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
a8:e9:71:04:0e:06:c5:12:42:10:dc:a7:45:02:31:33:51:70:5b:11:8c:be:9a:6b:69:57:72:b1:aa:7d:ed:b5Signer
Actual PE Digesta8:e9:71:04:0e:06:c5:12:42:10:dc:a7:45:02:31:33:51:70:5b:11:8c:be:9a:6b:69:57:72:b1:aa:7d:ed:b5Digest Algorithmsha256PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord690
_CIcos
_adj_fptan
__vbaVarMove
__vbaFreeVar
__vbaAryMove
__vbaStrVarMove
__vbaFreeVarList
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaRecAnsiToUni
ord552
__vbaSetSystemError
__vbaHresultCheckObj
ord558
_adj_fdiv_m32
__vbaAryDestruct
ord593
ord594
__vbaOnError
__vbaObjSet
ord595
_adj_fdiv_m16i
ord702
__vbaObjSetAddref
_adj_fdivr_m16i
ord703
_CIsin
__vbaChkstk
__vbaFileClose
EVENT_SINK_AddRef
__vbaStrCmp
__vbaAryConstruct2
__vbaR4Str
__vbaObjVar
DllFunctionCall
_adj_fpatan
ord568
ord569
__vbaRedim
ord677
__vbaRecUniToAnsi
EVENT_SINK_Release
ord600
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
ord531
__vbaFPException
__vbaDateVar
ord535
ord536
_CIlog
ord539
__vbaFileOpen
__vbaNew2
__vbaVar2Vec
ord570
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
ord575
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord100
__vbaVarTstNe
ord687
ord610
ord611
__vbaVarDup
__vbaStrToAnsi
ord612
__vbaFpI4
ord617
_CIatan
__vbaStrMove
__vbaCastObj
_allmul
__vbaLateIdSt
_CItan
ord546
_CIexp
ord580
__vbaFreeObj
__vbaFreeStr
Sections
.text Size: 208KB - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ