Static task
static1
Behavioral task
behavioral1
Sample
7165658079994b427f9d52d6d8134958_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7165658079994b427f9d52d6d8134958_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7165658079994b427f9d52d6d8134958_JaffaCakes118
-
Size
458KB
-
MD5
7165658079994b427f9d52d6d8134958
-
SHA1
ca8c3711f5c831e288163c473a71629336280b71
-
SHA256
3fbe73df434cc7e5976dab23d51039b216e07b3255e3efc0f13f6d404ea1c477
-
SHA512
fcf91f171862612c394a1170f05be83d192a6178d1577edf9b16a13f39e020a4ccd95ddf500101cb023450b85c003e128c0f874af9d0f7ab3b07490eccb340d8
-
SSDEEP
6144:Mhn8rjI/VaBIHu27y6vW2vS8YWCFlZ1ZSp9c/j0DzX3rVdqcSSc5FD1CZ7rrNe0g:lhIHP7y6v1olZTSzKiZdAfRMZbTwj
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7165658079994b427f9d52d6d8134958_JaffaCakes118
Files
-
7165658079994b427f9d52d6d8134958_JaffaCakes118.exe windows:4 windows x86 arch:x86
f7b7e921a8b8421a5042cead7c02073b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegEnumValueW
RegOpenKeyW
RegQueryValueExA
RegQueryValueW
RegSetValueA
RegSetValueExW
RegSetValueW
kernel32
CloseHandle
CreateFileA
CreateFileW
ExitProcess
InitializeCriticalSection
ReadFile
SetUnhandledExceptionFilter
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
signal
sprintf
sscanf
strcpy
wcscpy
user32
AdjustWindowRectEx
AppendMenuW
BeginPaint
BringWindowToTop
CallNextHookEx
CallWindowProcW
CheckMenuRadioItem
ChildWindowFromPoint
CloseClipboard
CreateDialogIndirectParamW
CreateDialogParamW
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefWindowProcW
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawFrameControl
DrawIcon
EmptyClipboard
EnableWindow
EndPaint
FlashWindow
GetAsyncKeyState
GetCapture
GetClassInfoW
GetClassNameW
GetClipboardData
GetDC
GetDlgItem
GetFocus
GetIconInfo
GetMenuItemCount
GetMenuItemInfoW
GetMenuState
GetMenuStringW
GetMessageTime
GetMessageW
GetParent
GetSystemMetrics
GetUpdateRect
GetWindow
GetWindowLongW
GetWindowTextLengthW
GetWindowTextW
HideCaret
InsertMenuItemW
InsertMenuW
InvalidateRect
IsClipboardFormatAvailable
IsWindowEnabled
IsWindowVisible
KillTimer
LoadBitmapW
LoadCursorW
LoadIconW
LoadImageW
MessageBeep
MessageBoxW
ModifyMenuW
MoveWindow
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
PostThreadMessageW
RedrawWindow
RegisterClassW
RegisterClipboardFormatW
RegisterHotKey
ReleaseCapture
ReleaseDC
RemoveMenu
SendMessageW
SetCapture
SetCursor
SetCursorPos
SetFocus
SetMenu
SetMenuItemInfoW
SetTimer
SetWindowLongW
SetWindowPos
SetWindowRgn
SetWindowTextW
SetWindowsHookExW
ShowCaret
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateAcceleratorW
TranslateMessage
UnhookWindowsHookEx
UnionRect
UnregisterClassW
UnregisterHotKey
UpdateWindow
WaitForInputIdle
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 325KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ