download
download_quiet
Overview
overview
10Static
static
307242bb97b...18.exe
windows7-x64
707242bb97b...18.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$TEMP/liqu...71.exe
windows7-x64
7$TEMP/liqu...71.exe
windows10-2004-x64
7$TEMP/windll.dll
windows7-x64
10$TEMP/windll.dll
windows10-2004-x64
10Static task
static1
Behavioral task
behavioral1
Sample
07242bb97b9ea36596a0d1a3408dca93_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
07242bb97b9ea36596a0d1a3408dca93_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$TEMP/liquid-story-binder-xe-4.71.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$TEMP/liquid-story-binder-xe-4.71.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$TEMP/windll.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$TEMP/windll.dll
Resource
win10v2004-20240508-en
Target
07242bb97b9ea36596a0d1a3408dca93_JaffaCakes118
Size
5.7MB
MD5
07242bb97b9ea36596a0d1a3408dca93
SHA1
20a2765eae47d6a2e5996e7f8e9a190b57f1fa46
SHA256
8e9da9d0951d1b5c2072ec336769277c8f8ef183ea367c6de7b9f00fbd6d484c
SHA512
9bd8ce2d15fa46275d6f4fad2676979e7e40c5084a750807a6a469edabbab9a24122ef627c003d45699d64477fd09b5990af03d36e5c9e58eb1f818db86aebf7
SSDEEP
98304:1jS3zel2FoiH9MJUJKaYooXd+zh2klFe8UNxmtL4ptVn8vZK0uAqiv81XRhylEiR:83ScOm9MaJK5rXnxmB4ptBoZkAqCwSlz
Checks for missing Authenticode signature.
resource |
---|
07242bb97b9ea36596a0d1a3408dca93_JaffaCakes118 |
unpack001/$PLUGINSDIR/NSISdl.dll |
unpack001/$TEMP/liquid-story-binder-xe-4.71.exe |
unpack001/$TEMP/windll.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_2 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControls
CreateBrushIndirect
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SelectObject
SetBkColor
SetBkMode
SetTextColor
CloseHandle
CompareFileTime
CopyFileA
CreateDirectoryA
CreateFileA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetDiskFreeSpaceA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersion
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
LoadLibraryExA
MoveFileA
MulDiv
MultiByteToWideChar
ReadFile
RemoveDirectoryA
SearchPathA
SetCurrentDirectoryA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetFileTime
Sleep
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpynA
lstrlenA
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
SHBrowseForFolderA
SHFileOperationA
SHGetFileInfoA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
AppendMenuA
BeginPaint
CallWindowProcA
CharNextA
CharPrevA
CheckDlgButton
CloseClipboard
CreateDialogParamA
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawTextA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
ExitWindowsEx
FillRect
FindWindowExA
GetClassInfoA
GetClientRect
GetDC
GetDlgItem
GetDlgItemTextA
GetMessagePos
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowLongA
GetWindowRect
InvalidateRect
IsWindow
IsWindowEnabled
IsWindowVisible
LoadBitmapA
LoadCursorA
LoadImageA
MessageBoxIndirectA
OpenClipboard
PeekMessageA
PostQuitMessage
RegisterClassA
ScreenToClient
SendMessageA
SendMessageTimeoutA
SetClassLongA
SetClipboardData
SetCursor
SetDlgItemTextA
SetForegroundWindow
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TrackPopupMenu
wsprintfA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
CloseHandle
CreateFileA
CreateSemaphoreA
CreateThread
DeleteFileA
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetTickCount
GlobalAlloc
GlobalFree
InterlockedDecrement
InterlockedIncrement
MulDiv
ReleaseSemaphore
SetLastError
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
_write
__dllonexit
_errno
_iob
abort
fflush
fputc
fputs
free
fwrite
malloc
memcpy
realloc
strcmp
strcpy
strlen
CallWindowProcA
CharPrevA
CreateWindowExA
DestroyWindow
EnableWindow
FindWindowExA
GetClientRect
GetDlgItem
GetFocus
GetWindowLongA
GetWindowRect
IsWindowVisible
RegisterWindowMessageA
SendMessageA
SetDlgItemTextA
SetWindowLongA
SetWindowTextA
ShowWindow
wsprintfA
WSACleanup
WSAGetLastError
WSAStartup
__WSAFDIsSet
closesocket
connect
gethostbyname
getsockname
htons
inet_addr
ioctlsocket
recv
select
send
shutdown
socket
download
download_quiet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReadConsoleW
FindAtomW
FreeLibraryAndExitThread
GetDiskFreeSpaceW
GetProfileStringW
FileTimeToDosDateTime
GetFileSizeEx
SetProcessShutdownParameters
GetDriveTypeA
GetAtomNameW
GetCurrentProcess
UnlockFileEx
OpenEventA
IsValidCodePage
GetTapeParameters
GetSystemDirectoryA
OpenMutexA
CancelWaitableTimer
LocalReAlloc
ReadConsoleInputA
SetVolumeMountPointW
SystemTimeToFileTime
WaitForMultipleObjectsEx
lstrcmpW
LocalAlloc
GetThreadPriority
CreateIoCompletionPort
FlushViewOfFile
ResetEvent
lstrcmpiA
DosDateTimeToFileTime
SetConsoleCtrlHandler
SearchPathW
SuspendThread
WaitNamedPipeA
CreateMutexW
GlobalHandle
SetVolumeLabelA
AddAtomW
SetLocalTime
DuplicateHandle
ReadConsoleInputW
GetTimeFormatW
GetEnvironmentVariableW
GetVolumeInformationA
GetUserDefaultLCID
VerSetConditionMask
GetDefaultCommConfigW
lstrcmpiW
lstrcmpA
EnumUILanguagesW
WriteProfileStringA
ExitThread
ReadConsoleA
FindFirstVolumeW
HeapUnlock
IsBadHugeReadPtr
EnumResourceLanguagesA
SetConsoleTextAttribute
GetSystemDirectoryW
CreateRemoteThread
GetDiskFreeSpaceExW
GetVolumePathNameW
SetFilePointer
GetSystemTimeAdjustment
RtlMoveMemory
HeapReAlloc
CreateSemaphoreA
ReadDirectoryChangesW
GetCurrentDirectoryW
GetThreadContext
SetHandleCount
SetErrorMode
ConnectNamedPipe
FindResourceW
SetConsoleMode
SearchPathA
SetFileApisToOEM
GetDiskFreeSpaceA
QueryPerformanceFrequency
CopyFileExW
OpenSemaphoreW
lstrlenW
VerLanguageNameW
SetComputerNameA
CreateProcessA
FindFirstVolumeMountPointW
GetDateFormatA
GetSystemDefaultLangID
GetCurrentDirectoryA
RegisterWaitForSingleObjectEx
CreateNamedPipeW
GetStartupInfoA
MultiByteToWideChar
GlobalReAlloc
GetModuleHandleW
WriteProfileStringW
GetFullPathNameA
OpenProcess
FlushConsoleInputBuffer
GetCurrentThread
GetEnvironmentStrings
CompareFileTime
GetFileInformationByHandle
LockFile
GetTimeZoneInformation
GetDriveTypeW
IsProcessorFeaturePresent
GetModuleHandleExW
LocalHandle
GetComputerNameExW
FindAtomA
ReleaseSemaphore
lstrcatW
GlobalFree
CreateFileMappingA
GetProcessHeap
InterlockedIncrement
Sleep
UnmapViewOfFile
CreateMutexA
GetModuleHandleA
GetLastError
EnterCriticalSection
CloseHandle
ExpandEnvironmentStringsA
LoadLibraryA
InterlockedDecrement
WaitForSingleObject
GetModuleFileNameA
GetTickCount
CreateFileA
CopyFileA
InterlockedExchange
GetComputerNameA
VirtualQuery
MoveFileA
HeapFree
DeleteFileA
GetSystemTimeAsFileTime
MapViewOfFile
GetProcAddress
HeapAlloc
FindFirstFileExW
StringFromGUID2
CoGetMalloc
OleUninitialize
CoQueryProxyBlanket
StgOpenStorageEx
StgIsStorageFile
CoFileTimeNow
CreateGenericComposite
CoDisconnectObject
GetHGlobalFromILockBytes
CoTaskMemRealloc
CoMarshalInterThreadInterfaceInStream
PropVariantClear
CoCreateFreeThreadedMarshaler
OleTranslateAccelerator
CoInitializeEx
CoUnmarshalInterface
OleSave
OleCreateFromFile
StringFromIID
FreePropVariantArray
SetConvertStg
OleCreateLinkFromData
CoMarshalInterface
CoDisableCallCancellation
OleCreateLinkToFile
CoFreeUnusedLibraries
OleCreate
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
CoCreateInstance
OleSetContainedObject
GetWindowContextHelpId
MessageBoxExA
VkKeyScanW
MapVirtualKeyExW
EnumThreadWindows
PeekMessageW
CharUpperW
CallWindowProcW
SetMenuItemBitmaps
ChildWindowFromPoint
DefWindowProcW
CheckRadioButton
EnumWindows
LoadAcceleratorsW
ChangeDisplaySettingsExW
SetScrollPos
DialogBoxIndirectParamA
SetSysColors
OffsetRect
EndDeferWindowPos
GetTabbedTextExtentA
SetScrollInfo
SetWindowPos
AdjustWindowRectEx
MapVirtualKeyA
CreateIconFromResourceEx
ExitWindowsEx
LoadMenuA
RegisterWindowMessageW
SetPropA
InternalGetWindowText
ModifyMenuW
GetDlgItemTextA
TabbedTextOutW
GetInputState
KillTimer
GetClassLongA
CharLowerBuffW
DrawTextA
PostThreadMessageA
DefDlgProcA
GetMenu
SetCaretPos
GetMenuDefaultItem
InvalidateRect
GetUserObjectInformationA
GetScrollRange
PtInRect
BeginDeferWindowPos
GetClassInfoExW
SetDlgItemTextA
WaitForInputIdle
EqualRect
DefDlgProcW
SetWindowLongW
SetCapture
AttachThreadInput
EnumChildWindows
EndPaint
DestroyWindow
ReleaseCapture
GetUpdateRgn
SetActiveWindow
ReuseDDElParam
UnregisterClassA
NotifyWinEvent
ScrollDC
PostMessageW
CharPrevA
LoadStringW
GetAsyncKeyState
SetWindowTextA
EnumDesktopsW
GetMenuItemCount
CreateIcon
DrawFrameControl
SystemParametersInfoA
TranslateAcceleratorA
OpenWindowStationW
CreateCursor
EnumDisplaySettingsA
InvertRect
InsertMenuA
ChangeDisplaySettingsA
ValidateRect
CharToOemW
PostQuitMessage
CreateAcceleratorTableW
GetAncestor
TabbedTextOutA
DefMDIChildProcW
MessageBoxW
DeferWindowPos
GrayStringW
UnionRect
ChangeDisplaySettingsW
CharNextW
GetCursorPos
WinHelpA
GetDialogBaseUnits
GetNextDlgTabItem
DrawTextExW
GetClientRect
DispatchMessageA
CreateWindowExA
RegisterClassExA
GetClassNameA
GetWindowThreadProcessId
UnhookWindowsHookEx
SetWindowsHookExA
GetMessageA
SetWindowLongA
SendMessageA
CallNextHookEx
GetDesktopWindow
GetSecurityDescriptorSacl
ConvertSidToStringSidA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryValueW
DuplicateToken
CreateProcessAsUserA
RegisterServiceCtrlHandlerA
CreateServiceW
RegisterServiceCtrlHandlerW
RegUnLoadKeyW
RegOpenKeyExW
EnumServicesStatusExW
RegEnumKeyW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExA
RegDeleteKeyW
RegSetValueW
StartServiceW
RegSaveKeyA
EnumDependentServicesW
UnlockServiceDatabase
ChangeServiceConfig2W
StartServiceA
OpenProcessToken
GetTokenInformation
GetServiceDisplayNameW
RegQueryValueExW
RegSaveKeyW
QueryServiceStatusEx
CloseEventLog
OpenServiceW
StartServiceCtrlDispatcherA
RegSetValueA
GetAclInformation
RegisterEventSourceA
CreateProcessWithLogonW
RegOpenCurrentUser
ImpersonateSelf
ReadEventLogA
RegRestoreKeyA
SetEntriesInAclA
CreateProcessAsUserW
QueryServiceConfigW
GetNumberOfEventLogRecords
RegFlushKey
RegisterEventSourceW
CreateMetaFileA
SetDCBrushColor
GetTextCharsetInfo
CreateFontIndirectA
CreateBitmap
GetTextMetricsA
GetBkColor
EnumFontFamiliesExA
CreateFontW
UnrealizeObject
StartDocA
SetRectRgn
SetBkColor
CopyMetaFileA
GetBrushOrgEx
CreateScalableFontResourceA
PolyBezierTo
GetTextColor
CreateCompatibleBitmap
PathToRegion
PlayMetaFileRecord
GetPath
CombineRgn
SetColorAdjustment
SetViewportExtEx
ExtCreateRegion
FillPath
ExtCreatePen
CreateDIBSection
EnumEnhMetaFile
GetTextExtentExPointA
ResetDCA
EqualRgn
ModifyWorldTransform
SetViewportOrgEx
CloseFigure
CreateBrushIndirect
SetBkMode
CreateDiscardableBitmap
SetTextColor
SetWindowOrgEx
PlayEnhMetaFileRecord
Escape
SetSystemPaletteUse
CreateCompatibleDC
SetPixel
PolyBezier
CreateICA
CreateICW
ScaleWindowExtEx
InvertRgn
CreateRectRgnIndirect
Ellipse
TextOutW
GetTextCharset
GetTextMetricsW
EnumMetaFile
StartPage
GetLayout
TextOutA
PolyDraw
ScaleViewportExtEx
AbortPath
CreateRectRgn
SetMagicColors
GetCurrentPositionEx
CreateBitmapIndirect
GetCurrentObject
CreatePolygonRgn
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ