DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
abb59d034880ec59f236cb265cae2a0c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
abb59d034880ec59f236cb265cae2a0c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
s1940.dll
Resource
win7-20240705-en
Target
abb59d034880ec59f236cb265cae2a0c_JaffaCakes118
Size
279KB
MD5
abb59d034880ec59f236cb265cae2a0c
SHA1
29691cdf7e6994633cf4ddd8cd21d9d7c36b561a
SHA256
2f7daa17bf1105200c2a5a22308c875acadc33d846ce681e3b8800668fca9127
SHA512
d496c344b57679b1b2e84f44dc518dc6a54faa55daa40bf09cc36f16ac7bdb570a0ebc8c59cc7900045f3308f859a734c444e160dfd37d0072520155b4c9bace
SSDEEP
6144:bf3U3OQzHcHK0xtKXtcpm/wmnifJAlWE2AAz+7KOFE:bPqOQz8HXLpQyAl3cz9b
Checks for missing Authenticode signature.
resource |
---|
abb59d034880ec59f236cb265cae2a0c_JaffaCakes118 |
unpack001/s1940.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
ImageList_AddMasked
ImageList_Destroy
ImageList_Create
ExpandEnvironmentStringsA
GetEnvironmentVariableA
lstrcmpiA
CloseHandle
SetFileTime
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
Sleep
GetFileSize
GetModuleFileNameA
GetTickCount
GetCurrentProcess
CopyFileA
ExitProcess
lstrcpynA
GlobalFree
GetWindowsDirectoryA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
GetSystemDirectoryA
MulDiv
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
ReadFile
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
GetCommandLineA
ExitWindowsEx
CharNextA
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
EndDialog
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
DispatchMessageA
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
PeekMessageA
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SetBkColor
SelectObject
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegEnumKeyA
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateMutexA
ReleaseMutex
TerminateProcess
OpenProcess
WaitForSingleObject
GetCurrentThread
GetCurrentProcessId
Process32Next
Process32First
CreateToolhelp32Snapshot
Module32Next
Module32First
GetShortPathNameA
FindClose
LocalFree
SizeofResource
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
DisableThreadLibraryCalls
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
lstrcpyA
lstrcatA
GetProcAddress
LoadLibraryA
GetLastError
LocalAlloc
CreateFileA
DeleteFileA
GetEnvironmentVariableA
FindFirstFileA
WriteFile
GetCommandLineA
GetModuleFileNameA
FreeLibrary
EnterCriticalSection
GlobalUnlock
lstrlenA
SetFilePointer
ReadFile
UnhandledExceptionFilter
GetModuleHandleA
TlsGetValue
SetLastError
TlsFree
TlsAlloc
HeapSize
CompareStringW
CompareStringA
GetCPInfo
LCMapStringW
LCMapStringA
GetVersion
HeapReAlloc
HeapAlloc
HeapFree
RaiseException
ExitProcess
GetSystemTimeAsFileTime
GetLocalTime
GetSystemTime
GetTimeZoneInformation
ExitThread
TlsSetValue
CreateThread
RtlUnwind
InterlockedExchange
FlushFileBuffers
SetUnhandledExceptionFilter
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
InterlockedIncrement
MultiByteToWideChar
GetCurrentThreadId
IsBadCodePtr
SetStdHandle
GetACP
GetOEMCP
SetEndOfFile
SetEnvironmentVariableA
FreeResource
IsBadReadPtr
GetStringTypeW
lstrlenW
SetThreadPriority
Sleep
InterlockedDecrement
WideCharToMultiByte
SetCurrentDirectoryA
lstrcmpA
GetCurrentProcess
FlushInstructionCache
GetVersionExA
GlobalAlloc
GlobalHandle
GlobalFree
GetStringTypeA
LoadResource
FindResourceA
FindNextFileA
LeaveCriticalSection
GlobalLock
TerminateThread
LockResource
CloseHandle
DispatchMessageA
TranslateMessage
GetWindowTextA
LoadStringA
SetWindowTextA
GetKeyState
SendMessageA
GetWindowTextLengthA
SetWindowPos
DefWindowProcA
CreateWindowExA
GetClassNameA
InvalidateRgn
InvalidateRect
SetCapture
ReleaseCapture
CreateAcceleratorTableA
GetDesktopWindow
RedrawWindow
BeginPaint
FillRect
EndPaint
IsChild
GetSysColor
GetSubMenu
LoadMenuA
CreateDialogIndirectParamA
IsDlgButtonChecked
PostMessageA
CheckDlgButton
CheckRadioButton
GetWindowRect
SystemParametersInfoA
GetDlgItemTextA
MessageBoxA
SetDlgItemTextA
GetDlgItem
GetParent
EndDialog
RegisterWindowMessageA
DialogBoxIndirectParamA
GetActiveWindow
FindWindowExA
CharNextA
GetWindow
GetFocus
RemoveMenu
CreatePopupMenu
AppendMenuA
SetFocus
MapWindowPoints
TrackPopupMenu
DestroyMenu
ReleaseDC
GetDC
MoveWindow
ShowWindow
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
IsWindow
DestroyWindow
CallWindowProcA
GetWindowLongA
SetWindowLongA
GetClientRect
GetObjectA
GetTextMetricsA
SelectObject
GetStockObject
BitBlt
CreateCompatibleDC
DeleteDC
DeleteObject
CreateSolidBrush
CreateCompatibleBitmap
GetDeviceCaps
SetSecurityDescriptorDacl
RegQueryInfoKeyA
RegDeleteValueA
RegQueryValueExA
ImpersonateSelf
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
RegCloseKey
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
ShellExecuteA
CoInitialize
CoTaskMemRealloc
OleLockRunning
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
RegisterDragDrop
ReleaseStgMedium
CoInitializeEx
CoUninitialize
CoCreateInstance
SysAllocStringByteLen
SafeArrayUnaccessData
SysFreeString
VariantClear
VariantChangeType
VariantCopy
SysAllocString
VariantInit
SysStringByteLen
SysAllocStringLen
SysStringLen
OleCreateFontIndirect
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
LoadTypeLi
SafeArrayCreateVector
SafeArrayAccessData
SHDeleteKeyA
InternetCloseHandle
InternetCanonicalizeUrlA
HttpSendRequestA
HttpOpenRequestA
InternetOpenA
InternetConnectA
HttpQueryInfoA
InternetReadFile
InternetGetCookieA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ