Static task
static1
Behavioral task
behavioral1
Sample
03e3f9eded93f245bd6a1026623b4294_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03e3f9eded93f245bd6a1026623b4294_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
03e3f9eded93f245bd6a1026623b4294_JaffaCakes118
-
Size
26KB
-
MD5
03e3f9eded93f245bd6a1026623b4294
-
SHA1
358921a8145330da28ed681e127d0b6d9c8b0f6f
-
SHA256
77460760c718d1ba16ed71e9ad3b9637553db3cf0dd5964b654457f6cc7c3c63
-
SHA512
7c9809da1a1210adad5d7fc64a25335ebdfa7473d8939edd04367dbcf5252b77ed36eda401b161a3347b4e87bd25584022c7eb24d03b7b48b9f24bcbc757c435
-
SSDEEP
384:Ipf1b9CGi7TRJULKMCNCAxDRZQHmQ62LCvF+GpN6WFE4zPPWN:i1b9bi7T/rNvZQGQfLCd+GNayeN
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03e3f9eded93f245bd6a1026623b4294_JaffaCakes118
Files
-
03e3f9eded93f245bd6a1026623b4294_JaffaCakes118.exe windows:4 windows x86 arch:x86
0efabce0aab1dd1406ea377d23ec9258
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExA
RegSetValueW
kernel32
CloseHandle
CreateFileA
CreateFileW
ExitProcess
InitializeCriticalSection
LeaveCriticalSection
MapViewOfFile
SetUnhandledExceptionFilter
TerminateThread
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
memcpy
memset
signal
strcpy
wcscpy
user32
BeginDeferWindowPos
CallWindowProcW
CheckMenuRadioItem
CreateDialogParamW
CreateMenu
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DeferWindowPos
DestroyCursor
DestroyIcon
DrawIcon
DrawStateW
DrawTextW
EmptyClipboard
EndDeferWindowPos
EndPaint
ExitWindowsEx
GetClientRect
GetClipboardData
GetDC
GetDesktopWindow
GetDlgItem
GetIconInfo
GetKeyState
GetSysColor
GetSystemMetrics
GetUpdateRect
GetUpdateRgn
GetWindowDC
GetWindowLongW
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
InflateRect
InsertMenuItemW
IsWindow
IsWindowEnabled
KillTimer
LoadBitmapW
LoadImageW
MessageBoxW
MoveWindow
OpenClipboard
PeekMessageW
PostMessageW
PtInRect
RegisterClassW
SetTimer
SetWindowTextW
ShowWindow
SystemParametersInfoW
TrackPopupMenu
UnhookWindowsHookEx
UnregisterHotKey
UpdateWindow
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 544B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 88B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ