Static task
static1
Behavioral task
behavioral1
Sample
scroller.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
scroller.vbs
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
scroller.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
scroller.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
wscroller.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
wscroller.exe
Resource
win10v2004-20240419-en
General
-
Target
0aaa903bd283052c93555dc3dab573a1_JaffaCakes118
-
Size
13KB
-
MD5
0aaa903bd283052c93555dc3dab573a1
-
SHA1
6ba6bfaf1d49c1555010e535e9609faf3e32999d
-
SHA256
3a1d843922be4e0e6c8aabd0b250ad638c1343911cf17c3fe376ce311e0c86d8
-
SHA512
013acc78dd632e3b71b1b8e19b693ba8576e76a0e4630a3f61c90b40f539b453594208d340ab88d35cfefd3fefd3a8bb6f443a012eb4ee62d9065c1b37ea44cf
-
SSDEEP
192:qBPxJ+PnXmDNYxGl/AwLftXgvN21kvxTj7bcRjYqTURprRNQrNtsrHhPbWsV:qRxaXm7AQXb1ofuZEplakVbf
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/scroller.exe unpack001/wscroller.exe
Files
-
0aaa903bd283052c93555dc3dab573a1_JaffaCakes118.zip
-
scroller.bas.vbs
-
scroller.exe.exe windows:4 windows x86 arch:x86
fc287f86c531bb74b4a11e2cae6d1685
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
crtdll
_controlfp
calloc
exit
floor
free
memset
rand
realloc
sin
srand
kernel32
ExitProcess
FreeLibrary
GetProcAddress
GetTickCount
LoadLibraryA
Sleep
user32
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
PeekMessageA
RegisterClassA
SetCursor
SystemParametersInfoA
TranslateMessage
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.const Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 244B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
wscroller.exe.exe windows:4 windows x86 arch:x86
804a5bb7ebcffeec2c559b6b484018ac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
crtdll
_controlfp
calloc
exit
floor
free
memset
rand
realloc
sin
srand
kernel32
ExitProcess
FreeLibrary
GetProcAddress
GetTickCount
LoadLibraryA
Sleep
user32
AdjustWindowRect
ClientToScreen
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
GetClientRect
GetSystemMetrics
LoadCursorA
PeekMessageA
RegisterClassA
ShowWindow
SystemParametersInfoA
TranslateMessage
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.const Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 244B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE