Static task
static1
Behavioral task
behavioral1
Sample
360caf9a003f188be11a7885222a5736_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
360caf9a003f188be11a7885222a5736_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
360caf9a003f188be11a7885222a5736_JaffaCakes118
-
Size
5.6MB
-
MD5
360caf9a003f188be11a7885222a5736
-
SHA1
12a48ab258cf476cc5be33fec7e2e0e315882550
-
SHA256
0d23ccb5fb75e6aef55ffc3cbace591d64079200627987d239c97ad42b02186a
-
SHA512
7278f34267452c0964516e095a905067ead06b7816b4301115d3c8453ec88bdc20d1b3cdda8147201d60aef6b55a188a6eb7fa6a24f97634c79e322ec23bbe8a
-
SSDEEP
98304:l+CvfbQHFwiVMd1nEQm97GfFYDM8dxh/U2Wqz1uc3tLaYSMZ4l9LkpfgTOY87W:IC3bQHFwF1nEQ2KNYoevcmz1u2+YgypU
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 360caf9a003f188be11a7885222a5736_JaffaCakes118
Files
-
360caf9a003f188be11a7885222a5736_JaffaCakes118.exe windows:4 windows x86 arch:x86
173bb19736ea251342321671fc7fe678
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateProcessA
CreateSemaphoreA
ExitProcess
GetCurrentDirectoryA
GetCurrentThreadId
GetFileAttributesA
GetLastError
GetModuleHandleA
GetProcAddress
GetWindowsDirectoryA
InterlockedDecrement
InterlockedIncrement
MoveFileA
ReleaseSemaphore
SetCurrentDirectoryA
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
msvcrt
_rmdir
_unlink
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_errno
_findclose
_findfirst
_findnext
_fullpath
_global_unwind2
_iob
_onexit
_setmode
abort
atexit
calloc
fclose
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
getenv
malloc
memchr
memmove
memset
realloc
remove
signal
sprintf
strcat
strcmp
strcpy
strerror
strlen
strrchr
user32
AllowSetForegroundWindow
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 256B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/4 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_MEM_DISCARDABLE
/19 Size: 24KB - Virtual size: 24KB
IMAGE_SCN_MEM_DISCARDABLE
/35 Size: 264KB - Virtual size: 263KB
IMAGE_SCN_MEM_DISCARDABLE
/47 Size: 25KB - Virtual size: 25KB
IMAGE_SCN_MEM_DISCARDABLE
/61 Size: 33KB - Virtual size: 32KB
IMAGE_SCN_MEM_DISCARDABLE
/73 Size: 15KB - Virtual size: 15KB
IMAGE_SCN_MEM_DISCARDABLE
/86 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_MEM_DISCARDABLE
/97 Size: 77KB - Virtual size: 77KB
IMAGE_SCN_MEM_DISCARDABLE
/108 Size: 18KB - Virtual size: 17KB
IMAGE_SCN_MEM_DISCARDABLE