Static task
static1
Behavioral task
behavioral1
Sample
69aab03dabc7f5f487fcf3c304037090_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
69aab03dabc7f5f487fcf3c304037090_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
69aab03dabc7f5f487fcf3c304037090_JaffaCakes118
-
Size
636KB
-
MD5
69aab03dabc7f5f487fcf3c304037090
-
SHA1
13ea64b5ef4c8e38bb3cd5cb319908dc5e154dfc
-
SHA256
c83c99679e77754150fab7ba46e53624930bda5ae3d23cadd9463da15868708b
-
SHA512
15f12c6122b383bac25c92ed7d25b1f196f25c2d56c35c5cec4aee6a6c86cd53e1cf3e061e848d6ae46c1493b0206c6000c52cb9464b42a1d820e16409416ae2
-
SSDEEP
12288:Yh5zcJKlrvp4YMLNpDhYs+Rx4NoftikwkEkNAC51o2g:YHMKgHLN83x8aikwkSC3o2g
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 69aab03dabc7f5f487fcf3c304037090_JaffaCakes118
Files
-
69aab03dabc7f5f487fcf3c304037090_JaffaCakes118.exe windows:4 windows x86 arch:x86
f7b7e921a8b8421a5042cead7c02073b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegEnumValueW
RegOpenKeyW
RegQueryValueExA
RegQueryValueW
RegSetValueA
RegSetValueExW
RegSetValueW
kernel32
CloseHandle
CreateFileA
CreateFileW
ExitProcess
InitializeCriticalSection
ReadFile
SetUnhandledExceptionFilter
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
signal
sprintf
sscanf
strcpy
wcscpy
user32
AdjustWindowRectEx
AppendMenuW
BeginPaint
BringWindowToTop
CallNextHookEx
CallWindowProcW
CheckMenuRadioItem
ChildWindowFromPoint
CloseClipboard
CreateDialogIndirectParamW
CreateDialogParamW
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefWindowProcW
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawFrameControl
DrawIcon
EmptyClipboard
EnableWindow
EndPaint
FlashWindow
GetAsyncKeyState
GetCapture
GetClassInfoW
GetClassNameW
GetClipboardData
GetDC
GetDlgItem
GetFocus
GetIconInfo
GetMenuItemCount
GetMenuItemInfoW
GetMenuState
GetMenuStringW
GetMessageTime
GetMessageW
GetParent
GetSystemMetrics
GetUpdateRect
GetWindow
GetWindowLongW
GetWindowTextLengthW
GetWindowTextW
HideCaret
InsertMenuItemW
InsertMenuW
InvalidateRect
IsClipboardFormatAvailable
IsWindowEnabled
IsWindowVisible
KillTimer
LoadBitmapW
LoadCursorW
LoadIconW
LoadImageW
MessageBeep
MessageBoxW
ModifyMenuW
MoveWindow
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
PostThreadMessageW
RedrawWindow
RegisterClassW
RegisterClipboardFormatW
RegisterHotKey
ReleaseCapture
ReleaseDC
RemoveMenu
SendMessageW
SetCapture
SetCursor
SetCursorPos
SetFocus
SetMenu
SetMenuItemInfoW
SetTimer
SetWindowLongW
SetWindowPos
SetWindowRgn
SetWindowTextW
SetWindowsHookExW
ShowCaret
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateAcceleratorW
TranslateMessage
UnhookWindowsHookEx
UnionRect
UnregisterClassW
UnregisterHotKey
UpdateWindow
WaitForInputIdle
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 817KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ