Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_671ec688cbd6ea58c6dbc73883e3d036.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_671ec688cbd6ea58c6dbc73883e3d036.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_671ec688cbd6ea58c6dbc73883e3d036
-
Size
514KB
-
MD5
671ec688cbd6ea58c6dbc73883e3d036
-
SHA1
0cf3e68ef37c43f96c5147908901b446f2a634bc
-
SHA256
504ef733f5192ed63ab730b6895cdf25a964cee0f4308f63a6cf4d678c77676b
-
SHA512
fbddbdf308767f6361eceb4d9e6ff9e2f7795aea6b49cc0650d90ecf47d207fbd70718e79961f086e7ff3ed1a00d6cbae861b713904466c07a32a31a80d348a3
-
SSDEEP
6144:gAnDEjA3sVxW6ibaBH31pBukR+amQHifGM3ufJMoVhPaXw966y0Zq:gN26ibaBH8QH2+JbV1agpI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_671ec688cbd6ea58c6dbc73883e3d036
Files
-
JaffaCakes118_671ec688cbd6ea58c6dbc73883e3d036.exe windows:4 windows x86 arch:x86
bc5c9fccf4aea2862dc479435e5b2c78
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
EVENT_SINK_GetIDsOfNames
ord588
MethCallEngine
EVENT_SINK_Invoke
ord516
ord519
ord660
ord556
Zombie_GetTypeInfo
ord591
EVENT_SINK2_Release
ord300
ord301
ord595
ord596
ord303
ord598
ord599
ord306
ord307
ord309
ord709
ord631
ord525
ord632
ord526
EVENT_SINK_AddRef
ord561
ord562
DllFunctionCall
Zombie_GetTypeInfoCount
EVENT_SINK_Release
ord601
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord607
ord608
ord716
ord717
ord319
ProcCallEngine
ord537
ord644
ord645
ord572
ord573
EVENT_SINK2_AddRef
ord681
ord578
ord685
ord100
ord320
ord321
ord616
ord617
ord619
ord652
ord581
Sections
.text Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ