e:\plugin\quicklnk\bin\360se.pdb
Static task
static1
Behavioral task
behavioral1
Sample
18fdb37abc2f3781ac456afa406ec7ea_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
18fdb37abc2f3781ac456afa406ec7ea_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
18fdb37abc2f3781ac456afa406ec7ea_JaffaCakes118
-
Size
76KB
-
MD5
18fdb37abc2f3781ac456afa406ec7ea
-
SHA1
98d4058217ff214744300f6e7b1d067cef53bd5b
-
SHA256
47193b2478bff8086103eccf62e68b56687ae6ce271cbe70f4d1c247b09bf6a6
-
SHA512
8e4383ee7e818c02163b44fb2e7772ba7eacf48e9ad3a803deac80728a1e7fab45e3d7655ba3f512910f6cf734025b6eace6b02a359a57f6742e28dd721cf007
-
SSDEEP
768:VDmnqGiYC8NXY9r4oICoR4OUrdIZU9qZU9b:V0HltNXEr4oYOOUrdIp8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18fdb37abc2f3781ac456afa406ec7ea_JaffaCakes118
Files
-
18fdb37abc2f3781ac456afa406ec7ea_JaffaCakes118.exe .vbs windows:4 windows x86 arch:x86 polyglot
87d350e880a2005b50b806f6c52b3908
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathFileExistsA
kernel32
Sleep
TerminateProcess
GetSystemDirectoryA
GetShortPathNameA
Process32Next
GetModuleFileNameA
CreateToolhelp32Snapshot
CloseHandle
Process32First
GetCurrentProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
LocalFree
MoveFileExA
WinExec
user32
EndDialog
PostQuitMessage
SetTimer
EndPaint
BeginPaint
DefWindowProcA
DestroyWindow
DialogBoxParamA
ShowWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
LoadStringA
UpdateWindow
shell32
SHFileOperationA
oleaut32
VariantClear
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
msvcr80
_invalid_parameter_noinfo
__dllonexit
_unlock
_onexit
_decode_pointer
_crt_debugger_hook
_invoke_watson
_controlfp_s
_except_handler4_common
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
??3@YAXPAX@Z
remove
fopen
fwrite
fclose
memmove_s
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
_lock
??2@YAPAXI@Z
tolower
__CxxFrameHandler3
_CxxThrowException
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ