Alloc
Call
Copy
Free
Get
Int64Op
Store
Static task
static1
Behavioral task
behavioral1
Sample
7205ae090bae6b188274cadfec996fba_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7205ae090bae6b188274cadfec996fba_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
proxy_chain.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
proxy_chain.exe
Resource
win10v2004-20240709-en
Target
7205ae090bae6b188274cadfec996fba_JaffaCakes118
Size
708KB
MD5
7205ae090bae6b188274cadfec996fba
SHA1
ad5d9c709adf61e3ed26cbe41fd9f4395ef6544e
SHA256
389049e1637ecc2c96a1244d3d642d96f68e97295964f45d5f670d68e4ac19fa
SHA512
f40eded95751a7d4f7e18ba4ad05301f0ce8fcabfd719c7abedc37ddae7cd8a185e1f731405d902fcda2b3183899ce9412b0112270c679147ba33eb4534d9a7a
SSDEEP
12288:bO2jn7beBcaJWIKX2NXzy9zDwJR9hTS0kMI4ksPUwyK5zWfsKmB:bTn7beWiWYXzczD6RThZI4ksPh5zWUKi
Checks for missing Authenticode signature.
resource |
---|
7205ae090bae6b188274cadfec996fba_JaffaCakes118 |
unpack001/$PLUGINSDIR/System.dll |
unpack001/proxy_chain.exe |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
c:\Work\cpp.vs\proxy_chain\x64\Release\proxy_chain.pdb
CreateFileA
GetFileSize
ReadFile
WriteFile
SetFilePointer
FindResourceA
LoadResource
LockResource
SizeofResource
FreeResource
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
IsBadReadPtr
InitializeCriticalSection
SystemTimeToFileTime
EnterCriticalSection
LeaveCriticalSection
GetFullPathNameW
GetFullPathNameA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
QueryPerformanceCounter
UnlockFile
LockFile
UnlockFileEx
GetSystemTimeAsFileTime
LoadLibraryW
FormatMessageW
GetFileAttributesW
CreateFileW
FlushFileBuffers
GetTempPathW
LockFileEx
GetDiskFreeSpaceW
CreateFileMappingA
GetDiskFreeSpaceA
GetFileAttributesExW
DeleteCriticalSection
DeleteFileW
GetTempPathA
GetSystemTime
CreateDirectoryA
CompareStringW
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
FlsAlloc
GetCurrentThreadId
FlsFree
FlsSetValue
FlsGetValue
DecodePointer
EncodePointer
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RtlUnwindEx
GetTimeZoneInformation
GetStdHandle
GetModuleHandleW
HeapCreate
SetEnvironmentVariableA
HeapSetInformation
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
FormatMessageA
IsBadWritePtr
FreeLibrary
GetProcAddress
LoadLibraryA
RemoveDirectoryA
CreateMutexA
SetLastError
SetConsoleCtrlHandler
GetModuleHandleA
GetCommandLineA
FindNextFileA
FindClose
DeleteFileA
GetVersionExA
FindFirstFileA
GetCurrentProcessId
GetLastError
ExitProcess
GetModuleFileNameA
GetFileAttributesA
GetLocalTime
CreateThread
CloseHandle
TerminateThread
WaitForSingleObject
Sleep
lstrcmpA
LocalAlloc
lstrcatA
lstrcpyA
lstrcmpiA
lstrcpynA
GetTickCount
LocalFree
lstrlenA
AreFileApisANSI
CompareStringA
GetStartupInfoA
HeapReAlloc
HeapAlloc
HeapFree
DispatchMessageA
PostThreadMessageA
wvsprintfA
LoadStringA
CharUpperA
MessageBeep
MessageBoxA
TranslateMessage
PeekMessageA
wsprintfA
OpenProcessToken
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
DeleteService
ControlService
CloseServiceHandle
StartServiceA
CreateServiceA
OpenServiceA
OpenSCManagerA
SetServiceStatus
GetTokenInformation
ShellExecuteExA
ShellExecuteA
gethostname
listen
bind
WSAStartup
WSAEnumNetworkEvents
WSAWaitForMultipleEvents
connect
WSAGetLastError
WSASend
getpeername
WSAEventSelect
WSACreateEvent
WSASocketA
WSAAccept
WSACloseEvent
closesocket
shutdown
WSARecv
setsockopt
inet_addr
gethostbyname
gethostbyaddr
htons
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ