Static task
static1
Behavioral task
behavioral1
Sample
70c832f99b1aebbd8afe26f6c2352b86_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
70c832f99b1aebbd8afe26f6c2352b86_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
70c832f99b1aebbd8afe26f6c2352b86_JaffaCakes118
-
Size
933KB
-
MD5
70c832f99b1aebbd8afe26f6c2352b86
-
SHA1
afad9656c363de3cb8f9228fab4f8e8a44253a6b
-
SHA256
d58658cba7dfdebb577c8f07b80911982575209828f414485232c76e7b9f78af
-
SHA512
d244e5c0baa6adf736f3a8624dbaae377d29815730c4ef05a0afdbbbff96cc1a43068e5a588426f92bdadfd4f1f3c00a2b051c2efbc73ca62eef39b8bec53a74
-
SSDEEP
24576:qgPQ+7DTml7irAebW1AScLuuEzU6/tt7RuV5iiAka8Zz:pQ+7DTi2VbWSyDzUeBRO5iiAEZz
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 70c832f99b1aebbd8afe26f6c2352b86_JaffaCakes118
Files
-
70c832f99b1aebbd8afe26f6c2352b86_JaffaCakes118.exe windows:4 windows x86 arch:x86
8307d18e294ac119e7fb0e2015757765
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCreateKeyExW
RegOpenKeyW
RegSetValueA
RegSetValueW
kernel32
CreateFileA
CreateFileW
ExitProcess
SetFilePointer
SetUnhandledExceptionFilter
TerminateThread
WriteFile
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
memcpy
signal
strcpy
wcscpy
user32
BeginPaint
CallNextHookEx
CallWindowProcW
ClientToScreen
CreateAcceleratorTableW
CreateWindowExW
DefWindowProcW
DestroyAcceleratorTable
EmptyClipboard
EndDeferWindowPos
GetClassNameW
GetCursorPos
GetDesktopWindow
GetDlgItem
GetMenuState
GetSysColor
GetWindow
GetWindowTextLengthW
KillTimer
LoadImageW
MoveWindow
MsgWaitForMultipleObjects
PostQuitMessage
ReleaseCapture
ScreenToClient
ScrollWindow
SendMessageW
SetCursor
SetParent
SetTimer
SetWindowLongW
SetWindowTextW
TranslateMessage
UnhookWindowsHookEx
VkKeyScanW
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ