DllInit
DllInstall
Static task
static1
Behavioral task
behavioral1
Sample
088b23d9fafd311fa909ef34b1d9a27b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
088b23d9fafd311fa909ef34b1d9a27b_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$TEMP/dbodbcgfx.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$TEMP/dbodbcgfx.dll
Resource
win10v2004-20240508-en
Target
088b23d9fafd311fa909ef34b1d9a27b_JaffaCakes118
Size
74KB
MD5
088b23d9fafd311fa909ef34b1d9a27b
SHA1
423d7ffadf23cdf5e6d03dca0062dd250d18141d
SHA256
ca6073cebb8904a546ed01cf200a526978059d031558f9784be23835a8c3ef33
SHA512
d8c4e8fc6652f515c44aecf9bc485597c4bd72c44245d1a0da1aa6c8bcb6f169d04ba5fc6f43d51d7b07f0fee3188c459b3791efd23080ce40bac0999ebe0b40
SSDEEP
1536:EpgpHzb9dZVX9fHMvG0D3XJgMQZYYkVG7zuTSkMB60mUZanO92OE6MhrBR:ygXdZt9P6D3XJgMQZY0zuri603b2HBR
Checks for missing Authenticode signature.
resource |
---|
088b23d9fafd311fa909ef34b1d9a27b_JaffaCakes118 |
unpack001/$TEMP/dbodbcgfx.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MapViewOfFile
CreateMutexA
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
lstrcpyW
CopyFileA
MoveFileExA
CreateFileMappingA
GetModuleHandleA
GetSystemTimeAsFileTime
VirtualQuery
lstrlenW
LoadLibraryA
GetModuleFileNameA
WaitForSingleObject
lstrlenA
HeapFree
HeapValidate
ReleaseMutex
HeapAlloc
InterlockedExchange
CloseHandle
GetComputerNameA
VirtualProtect
RtlMoveMemory
OpenMutexA
GetTempFileNameA
GlobalAlloc
EnumResourceNamesA
GetProfileIntA
RemoveDirectoryA
SystemTimeToFileTime
SetFileTime
SetConsoleScreenBufferSize
OpenEventW
CreatePipe
SetConsoleCtrlHandler
GetLogicalDrives
DeleteTimerQueueTimer
GetVersionExW
CreateEventA
SetFileApisToOEM
GetStringTypeA
GetHandleInformation
FindNextFileA
SetComputerNameExW
Sleep
HeapCompact
SetComputerNameA
GetSystemPowerStatus
GetThreadTimes
GetVolumePathNamesForVolumeNameW
SetConsoleActiveScreenBuffer
PurgeComm
GlobalFree
VerifyVersionInfoA
WriteConsoleInputA
GetSystemDirectoryW
GetConsoleScreenBufferInfo
FindAtomW
GetModuleHandleW
HeapSetInformation
OpenProcess
GetFileAttributesExW
SetEnvironmentVariableA
GetShortPathNameW
GetDefaultCommConfigW
GetAtomNameW
OpenEventA
VirtualAlloc
SetHandleInformation
CancelWaitableTimer
WaitForMultipleObjectsEx
AddAtomA
WriteConsoleW
ResetEvent
lstrcmpA
OpenFileMappingW
CopyFileW
IsWow64Process
WaitNamedPipeA
ExitProcess
WriteProcessMemory
SetHandleCount
lstrcpyA
CancelIo
InterlockedIncrement
CreateMailslotW
FindAtomA
GetComputerNameExW
DeleteCriticalSection
SetDefaultCommConfigW
GlobalFindAtomA
lstrcmpiA
LocalUnlock
IsValidLanguageGroup
GetCurrentThreadId
GetFileAttributesExA
GlobalMemoryStatus
FindNextChangeNotification
VerifyVersionInfoW
ExpandEnvironmentStringsW
GetBinaryTypeA
LocalSize
FormatMessageW
FindFirstVolumeW
GetCurrentDirectoryA
LocalFlags
lstrcmpW
GetComputerNameW
DuplicateHandle
ReadProcessMemory
GetNumberFormatA
OpenJobObjectW
LCMapStringA
GetSystemWindowsDirectoryA
GetStringTypeW
CreateConsoleScreenBuffer
SetProcessWorkingSetSize
FillConsoleOutputCharacterW
GetProcessVersion
GlobalGetAtomNameW
InterlockedExchangeAdd
GlobalAddAtomW
CreateIoCompletionPort
GetVolumeInformationW
GetExitCodeThread
GetVolumeNameForVolumeMountPointW
GetTimeFormatW
CreateMailslotA
GetProcessAffinityMask
AreFileApisANSI
SwitchToThread
lstrcpynA
CallNamedPipeA
HeapSize
LockResource
FlushFileBuffers
OpenThread
TerminateThread
SHFormatDrive
SHBindToParent
SHBrowseForFolderW
DragQueryFileW
SHGetPathFromIDListA
ShellExecuteExA
SHGetSpecialFolderLocation
ShellAboutW
ShellExecuteA
SHAddToRecentDocs
SHGetDesktopFolder
DragQueryFileA
SHGetFolderPathAndSubDirW
SHGetSpecialFolderPathW
DllInit
DllInstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ