Static task
static1
Behavioral task
behavioral1
Sample
6338dce61b04d2c14aa63794f10ff1e5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6338dce61b04d2c14aa63794f10ff1e5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6338dce61b04d2c14aa63794f10ff1e5_JaffaCakes118
-
Size
468KB
-
MD5
6338dce61b04d2c14aa63794f10ff1e5
-
SHA1
99b349e65f89cd13c71a3c0a98f1aa17909c6b0a
-
SHA256
921ab00eb96bb04dbc6cda7f8a0b6205471ed3139d247a5f844f3b700005f5ac
-
SHA512
17901edb9aebf93ce45fa97600d23d18e5007e6f2cf267581ac277eaf5db372de5ae670fe28cfdf211d444407def2a47e010594d8923a14ad86f4b607161edbb
-
SSDEEP
6144:lJt8OHhnBupqLTYkt7ssCZ8W54iZxPIoxPzqrR3oEfOUSt/SvQZc+597CFmY1eY9:LGOPOO8NsOUu+hoEGnxj59ceYeoFEVUz
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6338dce61b04d2c14aa63794f10ff1e5_JaffaCakes118
Files
-
6338dce61b04d2c14aa63794f10ff1e5_JaffaCakes118.exe windows:4 windows x86 arch:x86
536dfb5f83eac058e9710f21f65a90e3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegEnumValueW
RegOpenKeyExA
RegOpenKeyW
RegQueryValueExA
RegQueryValueW
RegSetValueA
RegSetValueExW
RegSetValueW
kernel32
AddAtomA
CloseHandle
CreateFileA
CreateFileW
ExitProcess
FindAtomA
GetAtomNameA
GetFileSize
InitializeCriticalSection
ReadFile
SetUnhandledExceptionFilter
TerminateThread
WriteFile
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
memset
signal
strcpy
strlen
wcscpy
user32
AdjustWindowRectEx
BeginDeferWindowPos
BeginPaint
BringWindowToTop
CallWindowProcW
ChangeDisplaySettingsW
ClientToScreen
CloseClipboard
CreateDialogIndirectParamW
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefWindowProcW
DeferWindowPos
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawFocusRect
DrawIcon
DrawMenuBar
DrawTextW
EnableWindow
EndDeferWindowPos
EndPaint
EnumClipboardFormats
EnumDisplaySettingsW
ExitWindowsEx
GetClassInfoW
GetClassNameW
GetCursorPos
GetDC
GetDesktopWindow
GetDlgItem
GetIconInfo
GetKeyState
GetMenuItemCount
GetMenuItemInfoW
GetMenuState
GetMenuStringW
GetMessagePos
GetMessageTime
GetParent
GetScrollInfo
GetSystemMenu
GetSystemMetrics
GetUpdateRect
GetWindow
GetWindowTextLengthW
GetWindowTextW
InflateRect
InsertMenuItemW
InsertMenuW
InvalidateRect
IsClipboardFormatAvailable
IsIconic
IsWindow
IsWindowVisible
IsZoomed
LoadBitmapW
LoadCursorFromFileW
LoadCursorW
LoadIconW
LoadImageW
MessageBeep
MessageBoxW
ModifyMenuW
OffsetRect
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
PtInRect
RegisterClassW
RegisterClipboardFormatW
RegisterHotKey
ReleaseDC
RemoveMenu
ScreenToClient
ScrollWindow
SendMessageW
SetMenu
SetMenuItemInfoW
SetParent
SetScrollInfo
SetWindowTextW
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateMessage
UnregisterClassW
UnregisterHotKey
UpdateWindow
ValidateRect
WaitForInputIdle
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 200B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ