Static task
static1
Behavioral task
behavioral1
Sample
d2fc98569da70f1a07aa24a55d1a33b3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2fc98569da70f1a07aa24a55d1a33b3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d2fc98569da70f1a07aa24a55d1a33b3_JaffaCakes118
-
Size
543KB
-
MD5
d2fc98569da70f1a07aa24a55d1a33b3
-
SHA1
12d5c3eb0f59b4b5da3e47ceebb1bbbebe53ae5c
-
SHA256
83f26f754393d5955f28f762c361d143c93b41c4fa4a4818d7e387b813e598a3
-
SHA512
138c3e2398d201dea982d9f18ce381d003ae2787e3d13b40917f3927ecf503add3b2b8133f619d11f7c9140a7d42b1900b4daab9836462cc1ffb2967b633e0f4
-
SSDEEP
12288:7rS88IeRlKaUaBMFq7XffI1duYZS66G7LBCYf7n5u:7bOlKaUaBMFqD3I1dBd9E
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d2fc98569da70f1a07aa24a55d1a33b3_JaffaCakes118
Files
-
d2fc98569da70f1a07aa24a55d1a33b3_JaffaCakes118.exe windows:4 windows x86 arch:x86
4c1c75fa8c41065c2a2404f28d137420
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegEnumValueW
RegOpenKeyExA
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExA
RegQueryValueW
RegSetValueExW
RegSetValueW
kernel32
CloseHandle
CreateFileA
CreateFileW
EnterCriticalSection
ExitProcess
GetFileSize
InitializeCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
WriteFile
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
signal
sprintf
sscanf
strcpy
wcscpy
user32
AdjustWindowRectEx
BeginPaint
BringWindowToTop
CallWindowProcW
CheckMenuItem
CheckMenuRadioItem
ChildWindowFromPoint
ClientToScreen
CloseClipboard
CreateAcceleratorTableW
CreateDialogParamW
CreateMenu
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefWindowProcW
DestroyAcceleratorTable
DestroyCursor
DestroyMenu
DestroyWindow
DispatchMessageW
DrawFocusRect
DrawFrameControl
DrawMenuBar
EnableMenuItem
EnableWindow
EndPaint
EnumWindows
FillRect
FlashWindow
GetClassNameW
GetClientRect
GetClipboardFormatNameW
GetCursorPos
GetDC
GetDlgItem
GetFocus
GetKeyState
GetMenuItemCount
GetMenuItemInfoW
GetMenuState
GetMessageW
GetParent
GetSystemMenu
GetSystemMetrics
GetUpdateRect
GetUpdateRgn
GetWindow
GetWindowDC
GetWindowLongW
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
InflateRect
InsertMenuW
InvalidateRect
IsClipboardFormatAvailable
IsDialogMessageW
IsWindow
IsWindowEnabled
IsZoomed
LoadAcceleratorsW
LoadBitmapW
LoadCursorW
LoadIconW
LoadImageW
MapWindowPoints
MessageBeep
MessageBoxW
ModifyMenuW
OffsetRect
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
PostThreadMessageW
PtInRect
RegisterClassW
RegisterClipboardFormatW
ReleaseDC
RemoveMenu
ScreenToClient
SendMessageW
SetClipboardData
SetFocus
SetMenu
SetMenuItemInfoW
SetParent
SetWindowLongW
SetWindowPos
SetWindowRgn
SetWindowTextW
ShowCursor
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnionRect
UnregisterClassW
UpdateWindow
WaitForInputIdle
WindowFromPoint
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 184B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 410KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ