Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
Static task
static1
Behavioral task
behavioral1
Sample
6d1ed054e5f65e3e916ded755d9a9942_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6d1ed054e5f65e3e916ded755d9a9942_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
HelpButton.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
HelpButton.dll
Resource
win10v2004-20240508-en
Target
6d1ed054e5f65e3e916ded755d9a9942_JaffaCakes118
Size
117KB
MD5
6d1ed054e5f65e3e916ded755d9a9942
SHA1
6ef2197050ffdfb63cd1a47d76d2e40591f976e1
SHA256
41159eb5b074f53d2cf11137a21002809eb4a4a71c78fac11b716cd199e24d05
SHA512
a6f89cdb12f626a9e444b7a01b2fee25a14c16e93ccaf0c2af39046f17242f27bb822009f84ba170a36d1e21aa2ef99f1c1e98edfd68e416674c9f8985768665
SSDEEP
3072:WM1BjoYNXoKDIJBXJP8455AETj8uZXw2JiWp7EI4S4tOz4+fTnTiRbk:WMMYNXqBB8+hTj8iXZJiWpE1S4oTnGbk
Checks for missing Authenticode signature.
resource |
---|
6d1ed054e5f65e3e916ded755d9a9942_JaffaCakes118 |
unpack001/$PLUGINSDIR/System.dll |
unpack001/HelpButton.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTickCount
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
SearchPathA
GetShortPathNameA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetEnvironmentVariableA
GetWindowsDirectoryA
GetTempPathA
Sleep
CloseHandle
LoadLibraryA
lstrlenA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
ReadFile
lstrcpyA
lstrcatA
GetSystemDirectoryA
GetVersion
GetProcAddress
GlobalAlloc
CompareFileTime
SetFileTime
ExpandEnvironmentStringsA
lstrcmpiA
lstrcmpA
WaitForSingleObject
GlobalFree
GetExitCodeProcess
GetModuleHandleA
SetErrorMode
GetCommandLineA
LoadLibraryExA
FindFirstFileA
FindNextFileA
DeleteFileA
SetFilePointer
WriteFile
FindClose
WritePrivateProfileStringA
MultiByteToWideChar
MulDiv
GetPrivateProfileStringA
FreeLibrary
CreateWindowExA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
GetDC
SystemParametersInfoA
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
ReleaseDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
GetClassInfoA
DialogBoxParamA
CharNextA
ExitWindowsEx
DestroyWindow
CreateDialogParamA
SetTimer
GetDlgItem
wsprintfA
SetForegroundWindow
ShowWindow
IsWindow
LoadImageA
SetWindowLongA
SetClipboardData
EmptyClipboard
OpenClipboard
EndPaint
PostQuitMessage
FindWindowExA
SendMessageTimeoutA
SetWindowTextA
SelectObject
SetBkMode
CreateFontIndirectA
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
ImageList_Create
ImageList_AddMasked
ImageList_Destroy
ord17
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GlobalFree
GlobalSize
lstrcpynA
lstrcpyA
GetProcAddress
VirtualFree
FreeLibrary
lstrlenA
LoadLibraryA
GetModuleHandleA
GlobalAlloc
WideCharToMultiByte
VirtualAlloc
VirtualProtect
GetLastError
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
DeleteCriticalSection
DisconnectNamedPipe
EnterCriticalSection
GetFileTime
GetLastError
GetModuleHandleA
GetProcAddress
InitializeCriticalSection
LeaveCriticalSection
SetTapeParameters
SetThreadContext
TlsGetValue
VirtualProtect
VirtualQuery
lstrcmpA
__dllonexit
_errno
_iob
abort
calloc
fflush
free
fwrite
malloc
memcpy
vfprintf
_2ANSJDzDh
_2XHvYvYd
_3n3cVqe
_42FSq
_4Pg9Un
_4fHPAb8
_5Nprh
_5ctAG
_5hEBNe
_5zFKwskj2
_6mYm2z9m2
_8HERYud
_98k9U83b
_9HXcG
_9eRsGPn
_9pJgX
_9u9PCDk
_ALGV5tW4R
_BfBT2umg
_BhwGTWP
_BjJyxss32
_BvXtbGhKx
_CnAU98
_D5JyBHqHM
_DnwrJ2pH
_EFgrhNT
_Em6VxDESf
_Ew4daJ
_EzdbjDwj
_FsPk6
_G4r5xzWS
_GmswB8MP
_GmzHcEJ
_GssHz9Up
_GxFBMPSw
_HHbqbrV
_HJwqJVL
_HVLJDT
_HmexD
_J2drwuD
_JHFhjd
_JMAqYqnu
_JRJUSpXha
_Jda2At
_KvcNuuAy
_L8RXPDg
_L8cr6
_LEgef6r
_LF3TEcNn
_LTvTBJJGz
_LnDMJRgqh
_LnwSqqtu
_Mb3YaCVNe
_N2CkG
_NHMbj
_Nfaf6xFfr
_NhJux59
_P2MYf25G
_PHmdpyqsu
_PfTj3
_SuGDEPJ
_U88KST
_UmTKCrD
_UwpEjYYC
_VJucPCK8
_VLTWGF
_WPD6LF
_WrW9w
_Ws22Ddy
_XGAXr
_XSf58
_XmXEhDzm
_Y45VwFq
_ayz2zX
_b25Vw
_b2WqCCJVE
_bWgssP
_cPpng2vG
_cRaUK
_cfU8DdS5K
_dReED
_dXt9D
_e6CjP
_eHYTcxNn
_f9kftcYcS
_fBH26
_fgBSsCF
_gBk5C
_gtG5MeMWz
_hLwD5mVT
_hVLfrLJ8
_jP2v5NED
_jcEP6
_jctW55Jvq
_jt5KPASC
_kChvX
_kGKwb
_khKs3x
_pKhdt
_q4u9Cf
_rNqhx
_reRU4ecYN
_scuNTdTf
_srrzz4c3M
_thADJ2hW
_tqLvJG
_uHYCGNGw
_uNr4d8R
_vUvXK56Kq
_wwUT5w
_xHFwDKu
_xbTap
_xcdTGe4
_xpLbpw
_ybk45Hf
_ychcV
_yhDJWTu
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ