Static task
static1
Behavioral task
behavioral1
Sample
8ccbf18d19fb9a78b4c1406d23026740_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8ccbf18d19fb9a78b4c1406d23026740_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ccbf18d19fb9a78b4c1406d23026740_JaffaCakes118
-
Size
401KB
-
MD5
8ccbf18d19fb9a78b4c1406d23026740
-
SHA1
9b85cfe26700a96109613726c183df1957c375e4
-
SHA256
1e43cb5272c5ea8a5bef6e36b502a60ef09be85f5bb199ce0ee3d79f83b324c5
-
SHA512
1df2db099e06ff0abfba788d0b2742a10dd0025dff3d4ee6b9d8f50ad2b8d2658d0e4696340d89c64fb1cee8cb4f4551caff8542ab9e8edaac9adb5cd63c2468
-
SSDEEP
6144:y7CF7g1VbQeEilC1yR5lgn8VKQSMSOO0NUFU6VD8fUKp85:UCNk10ylTKtZjUc8f4
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ccbf18d19fb9a78b4c1406d23026740_JaffaCakes118
Files
-
8ccbf18d19fb9a78b4c1406d23026740_JaffaCakes118.exe windows:4 windows x86 arch:x86
352b632c8ea2d92ffbd9b7280f9ebf39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyA
RegDeleteKeyW
RegOpenKeyW
RegQueryValueExA
RegQueryValueW
RegSetValueW
kernel32
CloseHandle
CreateFileMappingW
CreateFileW
ExitProcess
InitializeCriticalSection
MapViewOfFile
SetUnhandledExceptionFilter
UnmapViewOfFile
WriteFile
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
signal
sprintf
sscanf
strcpy
wcscpy
user32
AdjustWindowRectEx
BeginPaint
BringWindowToTop
CallWindowProcW
ChangeDisplaySettingsW
CheckMenuItem
ClientToScreen
CloseClipboard
CreateDialogIndirectParamW
CreateDialogParamW
CreateMenu
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefWindowProcW
DestroyCursor
DestroyMenu
DestroyWindow
DispatchMessageW
DrawEdge
DrawFocusRect
DrawFrameControl
DrawMenuBar
DrawStateW
EmptyClipboard
EnableMenuItem
EnableWindow
EndPaint
EnumDisplaySettingsW
ExitWindowsEx
FillRect
FlashWindow
GetActiveWindow
GetAsyncKeyState
GetCapture
GetClassNameW
GetClientRect
GetClipboardData
GetCursorPos
GetDC
GetDlgItem
GetForegroundWindow
GetKeyState
GetMessagePos
GetMessageTime
GetMessageW
GetParent
GetScrollInfo
GetSysColor
GetSystemMenu
GetSystemMetrics
GetUpdateRect
GetUpdateRgn
GetWindow
GetWindowDC
GetWindowLongW
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
HideCaret
InsertMenuItemW
InvalidateRect
IsClipboardFormatAvailable
IsDialogMessageW
IsIconic
IsWindowEnabled
IsZoomed
LoadBitmapW
LoadCursorW
LoadIconW
LoadImageW
MessageBeep
MessageBoxW
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
PostThreadMessageW
PtInRect
RedrawWindow
RegisterClassW
RegisterHotKey
ReleaseCapture
ReleaseDC
ScreenToClient
ScrollWindow
SendMessageW
SetCapture
SetClipboardData
SetCursor
SetCursorPos
SetForegroundWindow
SetParent
SetScrollInfo
SetWindowLongW
SetWindowRgn
SetWindowTextW
ShowCaret
ShowCursor
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateAcceleratorW
TranslateMessage
UnregisterClassW
UnregisterHotKey
UpdateWindow
ValidateRect
WaitForInputIdle
WindowFromPoint
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 928B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ