Static task
static1
Behavioral task
behavioral1
Sample
b2d2b54850a3f821a6e10e48e863ed0e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b2d2b54850a3f821a6e10e48e863ed0e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b2d2b54850a3f821a6e10e48e863ed0e_JaffaCakes118
-
Size
204KB
-
MD5
b2d2b54850a3f821a6e10e48e863ed0e
-
SHA1
5b2ccd8e4866439d19c1a542dea9541445aeeb4a
-
SHA256
aff4f8a47e7fbfc5a7816b6c77122cc02a15f1b09901826159fb0db85ea0a6ba
-
SHA512
424b59d7495d25a9008acd0050cebef02a1fd6897a36d928357db6f83c93212b349b9d2273bd4feddb70d9377f4c7eee76980e9b18512dbbb96d39a285201986
-
SSDEEP
6144:GJt8OehnBuCLxD4g4RXDi3Qek4qNb/AKOsNx5RJv:KGOKRxDD4FDiAr5I6ZXv
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b2d2b54850a3f821a6e10e48e863ed0e_JaffaCakes118
Files
-
b2d2b54850a3f821a6e10e48e863ed0e_JaffaCakes118.exe windows:4 windows x86 arch:x86
536dfb5f83eac058e9710f21f65a90e3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegEnumValueW
RegOpenKeyExA
RegOpenKeyW
RegQueryValueExA
RegQueryValueW
RegSetValueA
RegSetValueExW
RegSetValueW
kernel32
AddAtomA
CloseHandle
CreateFileA
CreateFileW
ExitProcess
FindAtomA
GetAtomNameA
GetFileSize
InitializeCriticalSection
ReadFile
SetUnhandledExceptionFilter
TerminateThread
WriteFile
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
memset
signal
strcpy
strlen
wcscpy
user32
AdjustWindowRectEx
BeginDeferWindowPos
BeginPaint
BringWindowToTop
CallWindowProcW
ChangeDisplaySettingsW
ClientToScreen
CloseClipboard
CreateDialogIndirectParamW
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefWindowProcW
DeferWindowPos
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawFocusRect
DrawIcon
DrawMenuBar
DrawTextW
EnableWindow
EndDeferWindowPos
EndPaint
EnumClipboardFormats
EnumDisplaySettingsW
ExitWindowsEx
GetClassInfoW
GetClassNameW
GetCursorPos
GetDC
GetDesktopWindow
GetDlgItem
GetIconInfo
GetKeyState
GetMenuItemCount
GetMenuItemInfoW
GetMenuState
GetMenuStringW
GetMessagePos
GetMessageTime
GetParent
GetScrollInfo
GetSystemMenu
GetSystemMetrics
GetUpdateRect
GetWindow
GetWindowTextLengthW
GetWindowTextW
InflateRect
InsertMenuItemW
InsertMenuW
InvalidateRect
IsClipboardFormatAvailable
IsIconic
IsWindow
IsWindowVisible
IsZoomed
LoadBitmapW
LoadCursorFromFileW
LoadCursorW
LoadIconW
LoadImageW
MessageBeep
MessageBoxW
ModifyMenuW
OffsetRect
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
PtInRect
RegisterClassW
RegisterClipboardFormatW
RegisterHotKey
ReleaseDC
RemoveMenu
ScreenToClient
ScrollWindow
SendMessageW
SetMenu
SetMenuItemInfoW
SetParent
SetScrollInfo
SetWindowTextW
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateMessage
UnregisterClassW
UnregisterHotKey
UpdateWindow
ValidateRect
WaitForInputIdle
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 200B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ