Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
Static task
static1
Behavioral task
behavioral1
Sample
3bc88ab2dae5dd7dc924b64e45a5e831_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3bc88ab2dae5dd7dc924b64e45a5e831_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
CDRom.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
CDRom.dll
Resource
win10v2004-20240226-en
Target
3bc88ab2dae5dd7dc924b64e45a5e831_JaffaCakes118
Size
170KB
MD5
3bc88ab2dae5dd7dc924b64e45a5e831
SHA1
abae00114caf6af0927deae70295a62adb8737e7
SHA256
22b08a645804b31fa9c5c3b99c45bf1abe15a10ad9fe49256e6397b4cea90186
SHA512
96e7df730b4316a28d1682b28d81b32c99c877b1dad363f060cd73b512c6e407b3a8e92988b0ce9bdc681d3f08612d0dcd229af93c115082f49fbf6c50b1ff97
SSDEEP
3072:t8Dsp+FNX1dFOvDlXJulh1l5Hw1PaxwJSY3pS7q/y/Ds1xZ0TAxiFK2HkoHd:t8dNXSElh1lxq7ZpQqa/ExZ0WiEQkw
Checks for missing Authenticode signature.
resource |
---|
3bc88ab2dae5dd7dc924b64e45a5e831_JaffaCakes118 |
unpack001/$PLUGINSDIR/System.dll |
unpack001/CDRom.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTickCount
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
SearchPathA
GetShortPathNameA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetEnvironmentVariableA
GetWindowsDirectoryA
GetTempPathA
Sleep
CloseHandle
LoadLibraryA
lstrlenA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
ReadFile
lstrcpyA
lstrcatA
GetSystemDirectoryA
GetVersion
GetProcAddress
GlobalAlloc
CompareFileTime
SetFileTime
ExpandEnvironmentStringsA
lstrcmpiA
lstrcmpA
WaitForSingleObject
GlobalFree
GetExitCodeProcess
GetModuleHandleA
SetErrorMode
GetCommandLineA
LoadLibraryExA
FindFirstFileA
FindNextFileA
DeleteFileA
SetFilePointer
WriteFile
FindClose
WritePrivateProfileStringA
MultiByteToWideChar
MulDiv
GetPrivateProfileStringA
FreeLibrary
CreateWindowExA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
GetDC
SystemParametersInfoA
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
ReleaseDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
GetClassInfoA
DialogBoxParamA
CharNextA
ExitWindowsEx
DestroyWindow
CreateDialogParamA
SetTimer
GetDlgItem
wsprintfA
SetForegroundWindow
ShowWindow
IsWindow
LoadImageA
SetWindowLongA
SetClipboardData
EmptyClipboard
OpenClipboard
EndPaint
PostQuitMessage
FindWindowExA
SendMessageTimeoutA
SetWindowTextA
SelectObject
SetBkMode
CreateFontIndirectA
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
ImageList_Create
ImageList_AddMasked
ImageList_Destroy
ord17
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GlobalFree
GlobalSize
lstrcpynA
lstrcpyA
GetProcAddress
VirtualFree
FreeLibrary
lstrlenA
LoadLibraryA
GetModuleHandleA
GlobalAlloc
WideCharToMultiByte
VirtualAlloc
VirtualProtect
GetLastError
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
InitializeSecurityDescriptor
OpenBackupEventLogA
GetMetaFileW
DeleteCriticalSection
EnterCriticalSection
FileTimeToDosDateTime
GetAtomNameW
GetLastError
GetModuleHandleA
GetProcAddress
GetThreadSelectorEntry
InitializeCriticalSection
LeaveCriticalSection
OpenMutexW
SetProcessShutdownParameters
TerminateProcess
TlsGetValue
VirtualProtect
VirtualQuery
lstrcmpA
__dllonexit
_errno
_iob
abort
calloc
fflush
free
fwrite
malloc
memcpy
vfprintf
DestroyWindow
SetMenuInfo
SetThreadDesktop
UnregisterClassA
_2V5FbK
_2bXJP5Tv8
_45rwrXd4K
_49uHAk99
_4DFxrTy
_4drepD
_4kNwa
_4n2UB
_4wUSzCHPR
_5FSddF4
_5M8ahxjUT
_5XD5D
_5a4fr
_5eE9A263
_6DhTtV
_6ELkuujW
_6K4W2dT
_6Smdk
_6whq4HAF
_83Bk53DS
_8e3hc
_8ktCX
_8zjkFNU8M
_9BWVJhhnu
_9WAVuXcT9
_9aarBc
_9dDPxtbX
_A2U55
_A6gcrKL
_AAW9Va
_ALg2h
_AaxAVq
_Amt8x3H
_AqGqv3
_Aug38
_AyyEvDMbS
_B4tWeG2X
_B9E9D5p
_BPmpcz
_BSuAH
_BVfLxgW
_Bbk2J
_BhnknLJ
_Bwa8bVXLN
_CE8aSC3
_CpeAu4XC
_Dd3JRwsh
_Dv36Y
_E4xg9vD
_ErEtFfY
_FHYUUPD
_FKMWFBw
_GAYqKu99G
_GS2XWa
_GVA8Dnv
_Gh3Jer
_Gs5qMR
_Gwn9wed
_HSS36jY
_HSbcJwuw
_HVvznGaWe
_HsChFATgY
_Hy6asUBL
_JPbG5y5g
_JU9LD
_K6DVE4
_Kgs8wYe9b
_KjC5Dpd
_LB8wrdkGH
_LfYpBv
_LgscAUkLw
_LrLxG
_Lt3EetF
_LuHNuSJ
_LwGrUC5jE
_M3G549
_MTAyuq
_MqsEnM
_NvHRzfx
_PKKFbs
_PYrRM
_PkPufV
_Pte2bc
_RHd3LuLLB
_RVF3r
_RW2mME
_RqrTcJ3c
_TBnYnsG
_TK5Gnty8
_TSzgKSzUa
_Th4xz
_TqFPwNkmL
_TxW5gAE
_UPUmF
_UWLGybr
_UaBS4
_Uf5KbWsg
_UjeeN
_UpKSS9V
_V3mVDXAb
_VJUgRs26y
_VUgDec2sn
_Vzfbz
_W2DAL9BCd
_W9xGEgW
_WC2CpNk
_WdS3r
_WhXz9p
_WtjdmSe
_X48WdjtF
_XBkcGe2
_XRMbqN
_XtLEbEMN
_XzgJesk3
_Y4vaW
_YAym5U2n
_YLryR
_YRfvD
_YRtLR
_YT6nmf
_Yex4SG
_YsKGSUn
_YtCvE
_aCYzb3
_aUTnR
_aeVUkRjX5
_agk9a
_arpPac
_aruKLhcy
_bMtwsY2
_bbrN5zB
_bgYUPW8
_bhaKH25gE
_bngBzStk
_bpLDW2KGb
_cFUNJY
_cfFbAWyUw
_cyYnAb
_d63erY
_dhrbrGUEv
_dkE6VxXy
_dyd45fNV
_e6ThXXhLr
_eeTzL
_ehgaDs
_f2dEkXa
_fnE2Pw
_fvTPx
_g9HCn9q
_gLqFjrW
_gfuej9k
_ghdFCL
_guCj3YL
_hKsD6
_jMhde
_jjqmupgg
_k9FyGSvNc
_kEEKM
_kHEEqf
_kbErX9x
_km6Dd
_mSR5A9GR
_mUV2DLGr
_n6eTDYyW
_nN3jRsN
_nUTkqJtJ
_nqmqg9mJs
_p9CC3F99
_p9kGB9Y6
_pu4KCA
_q4tfPv8g
_q8qbSLy
_qFNMqu
_qW3ry8
_qssvWdJ
_qz2cdw
_rBy8NkFVc
_rUMcwnD
_ra42YzR
_rrt4fmXq2
_sA6Mh9pwe
_sBxpKUcD
_tcyEdUuu
_tf8DKgYzt
_tnUFVB
_uHKfhSK
_uWfAxCz
_uXw5kkyf
_uzSua
_v2KU3
_vFkA9kuTS
_vPhzvwE5
_vPn5t
_vbp5u
_vqjLeen6s
_vtWAyLfW
_wGCthUr93
_wTxFcU
_x8USdP
_xAPT8
_xJ8Jxq3
_xJ9grmLe
_xLzthNBFn
_xWqHLxL
_xbkrURLxU
_y3tXDdx
_yBw53
_yHPXz5Jr
_yHeCKH
_yJ5XFCYVh
_yrscq
_ywYUjt5
_zb2RkB
_ztG2RvvvB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ