Static task
static1
Behavioral task
behavioral1
Sample
dc190f1b166ebfa72f1c352bb0b251ee_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc190f1b166ebfa72f1c352bb0b251ee_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
dc190f1b166ebfa72f1c352bb0b251ee_JaffaCakes118
-
Size
462KB
-
MD5
dc190f1b166ebfa72f1c352bb0b251ee
-
SHA1
8293d16190aeae5a1a29faa4a02d58dfc84e1822
-
SHA256
49a7ed8ff44074cc99c476ab07bee913a52051f3a9f2691163d821ac77ba3828
-
SHA512
bebd26d0b05013285e8b6574a55faadac65aa95fb280334bfb754aeff05c528776674f7d00eb7fcaaa384c1929129e6c32f7b95b7b014e90e37481cc2ee953eb
-
SSDEEP
12288:pfFhTBd47GLRMTbOKy7H6K/9RnzZAGvURHC:pfF/d474mfVeaI9dFAGvUQ
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc190f1b166ebfa72f1c352bb0b251ee_JaffaCakes118
Files
-
dc190f1b166ebfa72f1c352bb0b251ee_JaffaCakes118.exe windows:4 windows x86 arch:x86
4f51af28fd0a2c98a603498313d046d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegEnumValueW
kernel32
CloseHandle
CreateThread
ExitProcess
SetFilePointer
SetUnhandledExceptionFilter
TlsGetValue
WriteFile
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
memcpy
signal
strcpy
wcscpy
user32
AppendMenuW
CallNextHookEx
CheckMenuItem
CheckMenuRadioItem
CloseClipboard
CreateAcceleratorTableW
CreateMenu
CreatePopupMenu
DestroyCursor
DrawStateW
EnableWindow
EndPaint
EnumClipboardFormats
EnumWindows
FillRect
GetClassNameW
GetClientRect
GetClipboardData
GetMenuItemCount
GetMenuItemInfoW
GetSystemMenu
GetSystemMetrics
GetWindowTextW
InflateRect
InvalidateRect
IsWindow
MessageBeep
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
PostMessageW
PostQuitMessage
RegisterClassW
SetWindowRgn
SetWindowTextW
TranslateAcceleratorW
TranslateMessage
UnhookWindowsHookEx
UnregisterHotKey
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 335KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 241KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ