Static task
static1
Behavioral task
behavioral1
Sample
itranslator.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
itranslator.exe
Resource
win10v2004-20240426-en
General
-
Target
184cfc28e6a49dfc27f46882730d2046_JaffaCakes118
-
Size
7.7MB
-
MD5
184cfc28e6a49dfc27f46882730d2046
-
SHA1
c0b3795db7c82ff0cd2bc947cb05465ed0f477a3
-
SHA256
a6424cc1d3efc519a6bc61eae187ab89378d374493695d5ce5a1d602eb79d223
-
SHA512
c1d600a417ee9123df580d1e5ca95cb8309e8d491fb9936ae215da5494e38fe95b1bec4d0990226a86a0fb514dc1a8051ce07fc6224eb494c8427308e7fe3fb4
-
SSDEEP
196608:VM+aiT7BM0DUl3HhCbd2CiFNIj51ZMe6JkFuyIDE4BCLp:eri5M0O0bdxKLJwyDDY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/itranslator.exe
Files
-
184cfc28e6a49dfc27f46882730d2046_JaffaCakes118.zip
-
itranslator.exe.exe windows:5 windows x86 arch:x86
4e9d1e7435667b18568d67c75b0c9911
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
GetModuleFileNameW
MultiByteToWideChar
CreateDirectoryA
GetProcAddress
LockResource
GetModuleHandleA
SizeofResource
CloseHandle
DeleteFileA
CreateThread
ReadFile
SetEndOfFile
CreateFileW
GetStringTypeW
WaitForSingleObject
CreateProcessW
LoadResource
FindResourceW
FreeResource
GetVersionExA
FindResourceA
LCMapStringW
HeapReAlloc
HeapAlloc
HeapSize
OutputDebugStringW
FlushFileBuffers
WriteConsoleW
EncodePointer
DecodePointer
GetLastError
ExitProcess
GetModuleHandleExW
AreFileApisANSI
WideCharToMultiByte
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
WriteFile
GetConsoleCP
GetConsoleMode
HeapFree
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetStdHandle
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThreadId
GetProcessHeap
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
SetStdHandle
ReadConsoleW
user32
DispatchMessageA
GetMessageA
TranslateMessage
advapi32
CreateProcessWithLogonW
OpenProcessToken
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
SHGetSpecialFolderPathA
ntdll
RtlAllocateAndInitializeSid
NtDuplicateToken
RtlLengthSid
NtFilterToken
NtSetInformationToken
NtSetInformationThread
shlwapi
PathFileExistsA
PathFileExistsW
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8.2MB - Virtual size: 8.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ