Static task
static1
Behavioral task
behavioral1
Sample
eb0d031f93c6a9c58159721355fca531_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb0d031f93c6a9c58159721355fca531_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
eb0d031f93c6a9c58159721355fca531_JaffaCakes118
-
Size
544KB
-
MD5
eb0d031f93c6a9c58159721355fca531
-
SHA1
e801f9fdd7aa9f80950182629e5c49a637928278
-
SHA256
38123a5c175a39d6866d8f1ffb2c94ebec14eecc230bb9c0e52522eb2a576456
-
SHA512
3d35b43c535cca19dbc3dd880b4583f34b24f5b110fc35d2a20fc393fe3ff5fd1cc7537bb1bf286b10a19a33c1b1136500c88454616cc40c0d7da3d739d3e9ab
-
SSDEEP
12288:vJjmxiPBPhrp/TwUwoLN5vvgrJ8APrmHigOSbiaZ:vIARppMhoPvvurm2SGQ
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb0d031f93c6a9c58159721355fca531_JaffaCakes118
Files
-
eb0d031f93c6a9c58159721355fca531_JaffaCakes118.exe windows:4 windows x86 arch:x86
064975fe55ac9359b38b6431d7544f71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyA
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExA
RegQueryValueExW
RegQueryValueW
RegSetValueExW
RegSetValueW
kernel32
CloseHandle
CreateFileA
CreateFileW
EnterCriticalSection
ExitProcess
GetFileSize
InitializeCriticalSection
LeaveCriticalSection
ReadFile
SetUnhandledExceptionFilter
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WriteFile
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
signal
sprintf
sscanf
strcpy
wcscpy
user32
AdjustWindowRectEx
BeginPaint
CallWindowProcW
ChildWindowFromPoint
CloseClipboard
CreateAcceleratorTableW
CreateDialogIndirectParamW
CreateDialogParamW
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefMDIChildProcW
DefWindowProcW
DestroyAcceleratorTable
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawFrameControl
DrawIcon
DrawIconEx
DrawTextW
EmptyClipboard
EnableWindow
EndPaint
EnumWindows
FillRect
GetAsyncKeyState
GetClassInfoW
GetClassNameW
GetClientRect
GetDC
GetDesktopWindow
GetDlgItem
GetFocus
GetIconInfo
GetMenuState
GetMessageTime
GetMessageW
GetParent
GetScrollInfo
GetSubMenu
GetSysColor
GetSystemMetrics
GetUpdateRect
GetUpdateRgn
GetWindow
GetWindowDC
GetWindowLongW
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
InsertMenuItemW
InsertMenuW
InvalidateRect
IsIconic
IsWindow
IsWindowEnabled
KillTimer
LoadAcceleratorsW
LoadBitmapW
LoadCursorFromFileW
LoadCursorW
LoadIconW
LoadImageW
MapWindowPoints
MessageBeep
MessageBoxW
ModifyMenuW
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
RedrawWindow
RegisterClassW
RegisterClipboardFormatW
RegisterHotKey
ReleaseDC
RemoveMenu
ScrollWindow
SendMessageW
SetClipboardData
SetFocus
SetMenu
SetMenuItemInfoW
SetParent
SetScrollInfo
SetTimer
SetWindowLongW
SetWindowPos
SetWindowRgn
SetWindowTextW
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateMessage
UnionRect
UnregisterClassW
UnregisterHotKey
UpdateWindow
ValidateRect
WaitForInputIdle
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 408KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ