Static task
static1
Behavioral task
behavioral1
Sample
VisitCore.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
VisitCore.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240709-en
General
-
Target
4d6073aefa7cb32362bb1c23b1307986_JaffaCakes118
-
Size
424KB
-
MD5
4d6073aefa7cb32362bb1c23b1307986
-
SHA1
026c751493c3dde401bc07867f4ceafc8696e050
-
SHA256
b6e44f2969a1aafdc87c49a822c77b3863f4c1bdaabd6723cfb2638e4e28448c
-
SHA512
3e9eafafbbac4e97980d697744339f1e6f8d09e92eeaa34d7caf2e3ddd8a4b321d4ed20e16c0cd66a0bcd7b35c8cdbb361b59dd856cc6203af7183bee4411d2c
-
SSDEEP
12288:56CdzQrVueMZdRkCYr1RQc7F9ZKc1F6ItGk:57wVuPjkXr1RQc7cqYk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/VisitCore.exe
Files
-
4d6073aefa7cb32362bb1c23b1307986_JaffaCakes118.rar
-
VisitCore.exe.exe windows:4 windows x86 arch:x86
6b12cb6d23706c4ca26213c61808da94
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FatalAppExitA
DebugBreak
lstrcpyW
FindResourceA
FreeResource
LoadResource
GetCurrentProcess
SizeofResource
GetConsoleWindow
LockResource
CloseHandle
CreateFileA
ReadFile
FreeLibrary
WaitForSingleObject
VirtualFree
CreateRemoteThread
OpenProcess
VirtualFreeEx
ReadProcessMemory
GetProcAddress
VirtualAlloc
VirtualAllocEx
LoadLibraryA
WriteProcessMemory
GetFileSize
SetFilePointer
WriteFile
Sleep
GetTickCount
GetCurrentThread
InitializeCriticalSection
TerminateThread
LeaveCriticalSection
EnterCriticalSection
GetExitCodeThread
DeleteCriticalSection
GetCurrentThreadId
SuspendThread
ResumeThread
AllocConsole
ReadConsoleA
FreeConsole
SetConsoleMode
SetConsoleTitleA
GetStdHandle
AttachConsole
SetConsoleCtrlHandler
SetConsoleWindowInfo
HeapAlloc
HeapFree
GetProcessHeap
IsBadReadPtr
VirtualProtect
GetCommandLineA
HeapSetInformation
GetStartupInfoW
DecodePointer
lstrlenW
GetModuleHandleW
ExitProcess
GetFullPathNameA
HeapReAlloc
ExitThread
CreateThread
RtlUnwind
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
MoveFileA
CreateProcessA
DuplicateHandle
DeleteFileA
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetLocaleInfoW
LoadLibraryW
GetDriveTypeW
CompareStringW
LCMapStringW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
GetTimeZoneInformation
IsProcessorFeaturePresent
CreatePipe
GetExitCodeProcess
HeapSize
WriteConsoleW
GetCurrentDirectoryW
SetEndOfFile
CreateFileW
SetEnvironmentVariableA
IsBadWritePtr
InterlockedDecrement
InterlockedIncrement
GetFileAttributesA
LocalFree
GetLastError
MultiByteToWideChar
WideCharToMultiByte
FormatMessageA
GetModuleFileNameA
EncodePointer
GetModuleHandleA
ole32
OleRegGetUserType
CreateOleAdviseHolder
CoTaskMemAlloc
OleCreate
OleCreateFromFile
OleSetContainedObject
StringFromIID
CLSIDFromString
CLSIDFromProgID
CoRegisterClassObject
CoRevokeClassObject
MkParseDisplayName
CoCreateInstance
CoLockObjectExternal
CoTaskMemFree
StringFromCLSID
OleInitialize
OleUninitialize
CreateBindCtx
shlwapi
SHDeleteKeyA
user32
WinHelpA
TranslateMessage
GetMessageA
IsWindow
GetClientRect
RegisterClassA
CallWindowProcA
MapWindowPoints
IsWindowVisible
EqualRect
DefWindowProcA
GetActiveWindow
ShowWindow
SetWindowPos
GetSystemMenu
ModifyMenuA
SetForegroundWindow
SetWindowRgn
GetWindowRect
wsprintfA
SetFocus
OffsetRect
IntersectRect
MessageBoxA
GetWindowLongA
CreateWindowExA
DispatchMessageA
gdi32
SetWindowOrgEx
SetViewportOrgEx
DeleteObject
CreateRectRgnIndirect
SetWindowExtEx
SetViewportExtEx
SetMapMode
advapi32
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
oleaut32
SysFreeString
UnRegisterTypeLi
GetActiveObject
LoadTypeLibEx
SysAllocStringLen
LoadRegTypeLi
VariantClear
VariantInit
LHashValOfNameSys
VariantCopyInd
SafeArrayCreateVector
VariantTimeToSystemTime
SafeArrayAccessData
VariantCopy
SafeArrayDestroy
SafeArrayCreate
SystemTimeToVariantTime
SafeArrayGetDim
VariantChangeType
SafeArrayGetElement
SafeArrayUnaccessData
SafeArrayPutElement
DispGetIDsOfNames
SysStringLen
Sections
.text Size: 453KB - Virtual size: 453KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 702KB - Virtual size: 702KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.aauto Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
新云软件.url.url