download
download_quiet
Static task
static1
Behavioral task
behavioral1
Sample
c79aea22f18241839183c23b58d64271_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c79aea22f18241839183c23b58d64271_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/driver-detective-6.6.0.16.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$TEMP/driver-detective-6.6.0.16.exe
Resource
win10v2004-20240802-en
Target
c79aea22f18241839183c23b58d64271_JaffaCakes118
Size
882KB
MD5
c79aea22f18241839183c23b58d64271
SHA1
82eefc246df57921ba63f17c865b55199363363a
SHA256
44cb212ac89fb0bf959b97bca7ab3902a36cf16b5dc35c9d7f74aaffd86f635f
SHA512
9a6d823c05cd6a51011d59df1d287e23982fd91cea889ccd46400d4c391c14d9d4f4ed8bd0fee650b12edbc488493f7916d510744f1b6c70ddc68595f24f6ec3
SSDEEP
24576:JFuEJkqH+V7AagGSBK4RwUpPzGn+QaFk2b4yyp8occJ6HukH:n1khVExFRRA+RFlAp8oB6H5
Checks for missing Authenticode signature.
resource |
---|
c79aea22f18241839183c23b58d64271_JaffaCakes118 |
unpack001/$PLUGINSDIR/NSISdl.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControls
CreateBrushIndirect
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SelectObject
SetBkColor
SetBkMode
SetTextColor
CloseHandle
CompareFileTime
CopyFileA
CreateDirectoryA
CreateFileA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetDiskFreeSpaceA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersion
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
LoadLibraryExA
MoveFileA
MulDiv
MultiByteToWideChar
ReadFile
RemoveDirectoryA
SearchPathA
SetCurrentDirectoryA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetFileTime
Sleep
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpynA
lstrlenA
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
SHBrowseForFolderA
SHFileOperationA
SHGetFileInfoA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
AppendMenuA
BeginPaint
CallWindowProcA
CharNextA
CharPrevA
CheckDlgButton
CloseClipboard
CreateDialogParamA
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawTextA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
ExitWindowsEx
FillRect
FindWindowExA
GetClassInfoA
GetClientRect
GetDC
GetDlgItem
GetDlgItemTextA
GetMessagePos
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowLongA
GetWindowRect
InvalidateRect
IsWindow
IsWindowEnabled
IsWindowVisible
LoadBitmapA
LoadCursorA
LoadImageA
MessageBoxIndirectA
OpenClipboard
PeekMessageA
PostQuitMessage
RegisterClassA
ScreenToClient
SendMessageA
SendMessageTimeoutA
SetClassLongA
SetClipboardData
SetCursor
SetDlgItemTextA
SetForegroundWindow
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TrackPopupMenu
wsprintfA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
CloseHandle
CreateFileA
CreateSemaphoreA
CreateThread
DeleteFileA
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetTickCount
GlobalAlloc
GlobalFree
InterlockedDecrement
InterlockedIncrement
MulDiv
ReleaseSemaphore
SetLastError
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
_write
__dllonexit
_errno
_iob
abort
fflush
fputc
fputs
free
fwrite
malloc
memcpy
realloc
strcmp
strcpy
strlen
CallWindowProcA
CharPrevA
CreateWindowExA
DestroyWindow
EnableWindow
FindWindowExA
GetClientRect
GetDlgItem
GetFocus
GetWindowLongA
GetWindowRect
IsWindowVisible
RegisterWindowMessageA
SendMessageA
SetDlgItemTextA
SetWindowLongA
SetWindowTextA
ShowWindow
wsprintfA
WSACleanup
WSAGetLastError
WSAStartup
__WSAFDIsSet
closesocket
connect
gethostbyname
getsockname
htons
inet_addr
ioctlsocket
recv
select
send
shutdown
socket
download
download_quiet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
CommandLineToArgvW
SHFileOperationW
SHGetSpecialFolderLocation
ShellExecuteExW
ord17
CreateProcessW
lstrcpyW
GetWindowsDirectoryW
SetErrorMode
GetTempPathW
ExpandEnvironmentStringsW
LockResource
SizeofResource
LoadResource
FindResourceW
GetTickCount
GetExitCodeThread
CreateThread
CopyFileW
InterlockedIncrement
InterlockedDecrement
QueryPerformanceFrequency
CreateEventW
lstrcatW
GetTempFileNameW
CompareStringA
CompareStringW
GetVersionExW
LoadLibraryW
FreeLibrary
GetProcAddress
GetExitCodeProcess
ExitThread
GetCommandLineW
lstrcmpW
lstrcmpiW
GetSystemDefaultLCID
GlobalHandle
VerLanguageNameW
MoveFileW
SetCurrentDirectoryW
FindClose
FindNextFileW
CompareFileTime
FindFirstFileW
GetSystemTimeAsFileTime
SetFileAttributesW
LocalFree
FormatMessageW
GetSystemInfo
MulDiv
IsValidCodePage
GetVersion
GetModuleHandleW
GetFileAttributesW
GetCurrentDirectoryW
GetSystemDirectoryW
FileTimeToLocalFileTime
GetFileTime
IsBadReadPtr
VirtualQuery
lstrcmpiA
lstrcpyA
FlushFileBuffers
SetEndOfFile
GetDiskFreeSpaceW
GetDriveTypeW
CreateDirectoryW
GetLastError
GetLocaleInfoW
ResetEvent
VirtualProtect
GetCurrentProcessId
WaitForSingleObject
LoadLibraryExW
GetDateFormatW
WideCharToMultiByte
GetLocalTime
GetProcessTimes
OpenProcess
SearchPathW
SetEnvironmentVariableA
GetOEMCP
GetACP
GetTimeZoneInformation
SetStdHandle
SetConsoleCtrlHandler
LoadLibraryA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidLocale
GetCPInfo
GetStringTypeW
GetStringTypeA
IsBadCodePtr
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCommandLineA
GetEnvironmentStrings
GetEnvironmentStringsW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
SetLastError
FatalAppExitA
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapSize
GetStartupInfoW
GetModuleHandleA
HeapReAlloc
TerminateProcess
RaiseException
RtlUnwind
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
InitializeCriticalSection
EnterCriticalSection
lstrcmpA
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
lstrlenA
CreateFileW
GetFileSize
ExitProcess
GetCurrentProcess
DuplicateHandle
GetThreadContext
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
SetThreadContext
ResumeThread
DeleteFileW
Sleep
RemoveDirectoryW
SetFilePointer
GetProcessHeap
HeapAlloc
HeapFree
WriteFile
lstrcpynW
GetModuleFileNameW
FindResourceExW
lstrlenW
GlobalAlloc
CloseHandle
GlobalLock
ReadFile
GlobalUnlock
GlobalFree
GetTimeFormatW
MultiByteToWideChar
SetEvent
QueryPerformanceCounter
SystemTimeToFileTime
lstrcpynA
LocalAlloc
CreateFileA
GetTimeFormatA
GetCurrentThread
GetDateFormatA
UpdateWindow
SetCursor
GetWindow
GetDlgItemTextW
SetFocus
GetParent
GetWindowTextLengthW
GetWindowTextW
MoveWindow
GetWindowPlacement
DrawIcon
DestroyIcon
GetDlgCtrlID
FillRect
GetSysColor
GetSysColorBrush
GetSystemMetrics
SetRect
IntersectRect
SubtractRect
CharNextW
FindWindowExW
IsDialogMessageW
EnableWindow
SetWindowTextW
SendMessageW
GetWindowRect
ScreenToClient
IsWindow
GetClassInfoW
WaitForInputIdle
GetWindowLongW
BeginPaint
EndPaint
SetWindowLongW
GetClientRect
ClientToScreen
SetWindowPos
GetWindowDC
EndDialog
GetDlgItem
ShowWindow
GetDesktopWindow
wsprintfW
MsgWaitForMultipleObjects
PeekMessageW
MessageBoxW
CreateDialogIndirectParamW
CreateDialogParamW
DialogBoxIndirectParamW
DialogBoxParamW
DefWindowProcW
PostMessageW
KillTimer
PostQuitMessage
SetTimer
LoadIconW
LoadCursorW
RegisterClassW
CreateWindowExW
GetMessageW
TranslateMessage
DispatchMessageW
GetDC
ReleaseDC
wvsprintfW
LoadStringW
CharPrevW
ExitWindowsEx
SendDlgItemMessageW
DestroyWindow
FindWindowW
SetDlgItemTextW
CharUpperW
CreateFontW
GetTextExtentPoint32W
SetBkMode
SetTextColor
GetObjectW
CreateFontIndirectW
CreateSolidBrush
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
DeleteObject
GetStockObject
GetSystemPaletteEntries
CreatePalette
GetDeviceCaps
SelectPalette
RealizePalette
CreateDIBitmap
TranslateCharsetInfo
RegEnumKeyW
RegCreateKeyW
RegQueryValueExA
RegOpenKeyExA
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyW
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
RegEnumValueW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenThreadToken
RegDeleteKeyW
RegEnumKeyExW
FreeSid
CLSIDFromProgID
CoCreateInstance
StringFromCLSID
CoTaskMemFree
CoInitializeSecurity
CreateItemMoniker
GetRunningObjectTable
ProgIDFromCLSID
StringFromGUID2
CoUninitialize
CoInitialize
CoCreateGuid
SysAllocString
VariantClear
VariantChangeType
GetErrorInfo
SysReAllocStringLen
SysAllocStringLen
SysFreeString
CreateErrorInfo
RegisterTypeLi
LoadTypeLi
SetErrorInfo
SysStringLen
UuidFromStringW
RpcStringFreeW
UuidToStringW
UuidCreate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ