Static task
static1
Behavioral task
behavioral1
Sample
4bddd504fbd6446c3f5b8f1956522a8c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4bddd504fbd6446c3f5b8f1956522a8c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4bddd504fbd6446c3f5b8f1956522a8c_JaffaCakes118
-
Size
589KB
-
MD5
4bddd504fbd6446c3f5b8f1956522a8c
-
SHA1
2d6c5767ce2584cdacf21cc1a1f70db9bf38252d
-
SHA256
855a89ab194f2bd45d388c2dfb356e213f7c0a6b5c1775211112f8ba0fb09b65
-
SHA512
007a20b55cae9003c5369c41d909005d2434306892fa5afa0ab940722dcd332a50d10ea498b2db90c6a35d0dd3e176a25f479bf2fb1f0fa6c54f588a6ebeeea0
-
SSDEEP
12288:uRFj668BiejQ/ITxOzePK/Zr+DOBGneNE17inhBVjR3suMx4fORFUvGnJ6niHbMs:R6ZG4xYDobi7ihBVjR3s5x4fQFPwni7N
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4bddd504fbd6446c3f5b8f1956522a8c_JaffaCakes118
Files
-
4bddd504fbd6446c3f5b8f1956522a8c_JaffaCakes118.exe windows:4 windows x86 arch:x86
e222b52ce40d7089492a8aca64948746
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
SetUnhandledExceptionFilter
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
memset
signal
strcpy
strlen
wcscpy
user32
BringWindowToTop
CheckMenuItem
CheckMenuRadioItem
ClientToScreen
CloseClipboard
CopyRect
CreateAcceleratorTableW
CreateDialogIndirectParamW
CreateMenu
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DeferWindowPos
DestroyAcceleratorTable
DestroyCursor
DestroyIcon
DestroyMenu
DrawEdge
DrawFocusRect
DrawStateW
DrawTextW
EnableMenuItem
EnableWindow
EnumClipboardFormats
ExitWindowsEx
FillRect
GetActiveWindow
GetCapture
GetClassInfoW
GetClassNameW
GetClientRect
GetClipboardData
GetCursorPos
GetDC
GetDesktopWindow
GetDlgItem
GetFocus
GetKeyState
GetMenuItemCount
GetMenuItemInfoW
GetMenuState
GetMessagePos
GetParent
GetSystemMetrics
GetUpdateRect
GetUpdateRgn
GetWindowDC
GetWindowLongW
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
InflateRect
InsertMenuW
IsClipboardFormatAvailable
IsWindow
IsWindowEnabled
IsWindowVisible
IsZoomed
KillTimer
LoadBitmapW
LoadCursorFromFileW
LoadIconW
LoadImageW
ModifyMenuW
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
OpenClipboard
PostQuitMessage
PtInRect
RedrawWindow
RegisterClipboardFormatW
RegisterHotKey
ReleaseCapture
ReleaseDC
RemoveMenu
ScreenToClient
ScrollWindow
SetCapture
SetCursor
SetCursorPos
SetFocus
SetForegroundWindow
SetWindowLongW
SetWindowPos
SetWindowTextW
SetWindowsHookExW
ShowCaret
ShowCursor
SystemParametersInfoW
TranslateAcceleratorW
TranslateMessage
UnionRect
UnregisterHotKey
UpdateWindow
WindowFromPoint
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 250KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ