Static task
static1
Behavioral task
behavioral1
Sample
bad1e56dad618e3e4efa9982e2e22f9f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bad1e56dad618e3e4efa9982e2e22f9f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bad1e56dad618e3e4efa9982e2e22f9f_JaffaCakes118
-
Size
645KB
-
MD5
bad1e56dad618e3e4efa9982e2e22f9f
-
SHA1
36a1f4ebde83f21542c9c275bf3f43630c634b42
-
SHA256
3cf1c51a5637d4c2669ba699c41c06bcac05d161f397ba96ed3e5fb815280af5
-
SHA512
aaf6251d175479ec0601665e7d3f5a4dfe1adc6b2f5e380bed1ef8dfd3f5a4ff4b4e029f04803bf51e479ad5f3ac2be0e24dc781e871de4af36e0967849c10f7
-
SSDEEP
12288:19wiR8aIwdCXDMD9KV7IPUhhmLMjrBcZGIvaldKqjQ3CWqwsUSeNnxF:zvRJIkm7IPzAjrBcMIvxqTWqwlnz
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bad1e56dad618e3e4efa9982e2e22f9f_JaffaCakes118
Files
-
bad1e56dad618e3e4efa9982e2e22f9f_JaffaCakes118.exe windows:4 windows x86 arch:x86
c713e13b2f0f2797f54a4a19d60d23df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegOpenKeyW
RegSetValueW
kernel32
CreateFileA
ExitProcess
SetUnhandledExceptionFilter
SwitchToFiber
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
memcpy
signal
strcpy
wcscpy
user32
BeginDeferWindowPos
BeginPaint
CallWindowProcW
ChildWindowFromPoint
DeferWindowPos
DestroyCursor
EnableWindow
FillRect
GetActiveWindow
GetAsyncKeyState
GetCursorPos
GetFocus
GetMessageW
GetWindow
HideCaret
KillTimer
LoadBitmapW
LoadIconW
MapWindowPoints
OffsetRect
OpenClipboard
SetMenu
SetWindowTextW
TranslateAcceleratorW
UnregisterClassW
UpdateWindow
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 692KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ