Alloc
Call
Copy
Free
Get
Int64Op
Store
Overview
overview
7Static
static
740d7a3d23e...18.exe
windows7-x64
740d7a3d23e...18.exe
windows10-2004-x64
7$0/AWF.cmd
windows7-x64
1$0/AWF.cmd
windows10-2004-x64
1$0/ActiveDrv.vbs
windows7-x64
1$0/ActiveDrv.vbs
windows10-2004-x64
1$0/AppDataFile.vbs
windows7-x64
1$0/AppDataFile.vbs
windows10-2004-x64
1$0/Assoc.cmd
windows7-x64
1$0/Assoc.cmd
windows10-2004-x64
1$0/Auto-RC.cmd
windows7-x64
1$0/Auto-RC.cmd
windows10-2004-x64
1$0/Boot-Rk.cmd
windows7-x64
1$0/Boot-Rk.cmd
windows10-2004-x64
1$0/Boot.bat
windows7-x64
4$0/Boot.bat
windows10-2004-x64
4$0/BootDrv.vbs
windows7-x64
1$0/BootDrv.vbs
windows10-2004-x64
1$0/CF-Script.cmd
windows7-x64
1$0/CF-Script.cmd
windows10-2004-x64
1$0/Catch-sub.cmd
windows7-x64
1$0/Catch-sub.cmd
windows10-2004-x64
1$0/Combo-Fix.sys
windows7-x64
1$0/Combo-Fix.sys
windows10-2004-x64
1$0/ComboFi...ad.exe
windows7-x64
1$0/ComboFi...ad.exe
windows10-2004-x64
1$0/Combobatch.bat
windows7-x64
1$0/Combobatch.bat
windows10-2004-x64
1$0/Create.cmd
windows7-x64
1$0/Create.cmd
windows10-2004-x64
1$0/CregC.cmd
windows7-x64
1$0/CregC.cmd
windows10-2004-x64
1Behavioral task
behavioral1
Sample
40d7a3d23e6c40b65364ec978609a70f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
40d7a3d23e6c40b65364ec978609a70f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$0/AWF.cmd
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$0/AWF.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$0/ActiveDrv.vbs
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$0/ActiveDrv.vbs
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$0/AppDataFile.vbs
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$0/AppDataFile.vbs
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$0/Assoc.cmd
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$0/Assoc.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$0/Auto-RC.cmd
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$0/Auto-RC.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$0/Boot-Rk.cmd
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$0/Boot-Rk.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$0/Boot.bat
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$0/Boot.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$0/BootDrv.vbs
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$0/BootDrv.vbs
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$0/CF-Script.cmd
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
$0/CF-Script.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$0/Catch-sub.cmd
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$0/Catch-sub.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$0/Combo-Fix.sys
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
$0/Combo-Fix.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$0/ComboFix-Download.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
$0/ComboFix-Download.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$0/Combobatch.bat
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
$0/Combobatch.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$0/Create.cmd
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
$0/Create.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
$0/CregC.cmd
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
$0/CregC.cmd
Resource
win10v2004-20240709-en
Target
40d7a3d23e6c40b65364ec978609a70f_JaffaCakes118
Size
1.1MB
MD5
40d7a3d23e6c40b65364ec978609a70f
SHA1
b380d69329bc7fcea0468ed2a8cb01d6c54930b3
SHA256
52cf6f701bbdd4d617cbc94f19af36c3b2712cf6d064d8eac5d40759b6b065fb
SHA512
1b4b8bde8857f502308a488a03569feef7496c583175357e19f49b7c9247f348f8e8e1938462b346101b1f048103a54ceea0f19ff15549b57b3f068c5a252496
SSDEEP
24576:4+Wqi4A+IrSYBY4rc1tOUa/sdJL2NjjVy8G9c+ilX2lxjQEc8H+WQWmRteGKAT:DiOrY5rctaEdMNY8cflOEce+WUkG1
resource | yara_rule |
---|---|
sample | upx |
static1/unpack001/$0/ERDNT.e_e | upx |
Checks for missing Authenticode signature.
resource |
---|
40d7a3d23e6c40b65364ec978609a70f_JaffaCakes118 |
unpack001/$0/Combo-Fix.sys |
unpack001/$0/ComboFix-Download.3XE |
unpack001/$0/ERDNT.e_e |
unpack001/$0/ERUNT.3XE |
unpack001/$0/FileKill.3XE |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/UserInfo.dll |
unpack001/out.upx |
resource | yara_rule |
---|---|
static1/unpack001/out.upx | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersion
GetCurrentThread
lstrcpynA
GetCurrentProcess
GetModuleHandleA
GetProcAddress
GetLastError
GlobalFree
CloseHandle
GlobalAlloc
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
GetUserNameA
OpenThreadToken
GetAccountType
GetName
GetOriginalAccountType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ