Static task
static1
Behavioral task
behavioral1
Sample
新云软件.url
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
新云软件.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
神奇文件夹.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
神奇文件夹.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
神奇文件夹解除.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
神奇文件夹解除.exe
Resource
win10v2004-20240508-en
General
-
Target
1bc85eb49907bba0bd13391ed9e23b9c_JaffaCakes118
-
Size
538KB
-
MD5
1bc85eb49907bba0bd13391ed9e23b9c
-
SHA1
70a7a73768a0f8433e5fea1be50726d62a1815e6
-
SHA256
f922a2ec871c900c134be62c3a4fdd675a0ffae971da7d0391d2c109ed56d3e8
-
SHA512
22e7932ad67a664f144196c188d7ff2668d285688feec0a749139d776c1aba30f8bf310c2acaed41a77a5e509b4e9c3699e1e6f2ae0fede9b725ba0ead2871e3
-
SSDEEP
12288:1g/VCSiWGSxppuXO3jxnoByTjyvc5AcyJj6Lf5RKY7KswZ:u/EnWGspp3jxnUyTjyv4Ax+LqYk
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/神奇文件夹.exe unpack001/神奇文件夹解除.exe
Files
-
1bc85eb49907bba0bd13391ed9e23b9c_JaffaCakes118.rar
-
新云软件.url.url
-
神奇文件夹.exe.exe windows:4 windows x86 arch:x86
9165ea3e914e03bda3346f13edbd6ccd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
WriteFile
CreateDirectoryA
GetTempPathA
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetStringTypeA
LCMapStringW
LCMapStringA
HeapAlloc
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeW
user32
MessageBoxA
wsprintfA
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ecode Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
神奇文件夹解除.exe.exe windows:4 windows x86 arch:x86
ae0a5112fe1176f4e5f6e1bc95e4c209
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
kernel32
FreeLibrary
lstrcatA
GetModuleFileNameA
ExitProcess
LoadLibraryA
GetProcAddress
lstrlenA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 1024B - Virtual size: 556B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 404B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ecode Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ