Alloc
Call
Copy
Free
Get
Int64Op
Store
Overview
overview
10Static
static
3d71947f0f9...18.exe
windows7-x64
3d71947f0f9...18.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...rl.dll
windows7-x64
3$PLUGINSDI...rl.dll
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
d71947f0f939f89291ac5dfc1ceddfaf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d71947f0f939f89291ac5dfc1ceddfaf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/estUrl.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/estUrl.dll
Resource
win10v2004-20240802-en
Target
d71947f0f939f89291ac5dfc1ceddfaf_JaffaCakes118
Size
245KB
MD5
d71947f0f939f89291ac5dfc1ceddfaf
SHA1
194bd17d8197d67938ec87a76c411ff9a06a7b3d
SHA256
30b60a09d2e7719348a0d2235d347b021db396a5cb0031d8893315847946adad
SHA512
dddcd404edadd2616e9f64f030c3702791aa53436e2f621705afb2e3bd9a99165386d1100bc472fe45029330f21d1bcfcaf1dabbff508d9f7378cce2c3958bce
SSDEEP
6144:y607A/fndErEt56ULMS7YRKKO1lE/vFGfA4iU:g+fndE4t52S7LvMkfAi
Checks for missing Authenticode signature.
resource |
---|
d71947f0f939f89291ac5dfc1ceddfaf_JaffaCakes118 |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/UserInfo.dll |
unpack001/$PLUGINSDIR/estUrl.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
LoadLibraryA
CreateProcessA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
RemoveDirectoryA
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GlobalFree
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
CheckDlgButton
ScreenToClient
GetMessagePos
CallWindowProcA
IsWindowVisible
LoadBitmapA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuA
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
LoadCursorA
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SetCursor
GetWindowLongA
GetSysColor
CharNextA
ExitWindowsEx
SetWindowPos
PostMessageA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegEnumKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumValueA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersion
GetCurrentThread
GetCurrentProcess
GetModuleHandleA
GetProcAddress
GetLastError
GlobalFree
CloseHandle
lstrcpynA
GlobalAlloc
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
GetUserNameA
OpenThreadToken
GetAccountType
GetName
GetOriginalAccountType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
e:\SetupProject\NSIS-release\includeESTsoft\Projects\pdb\estUrl.pdb
lstrcmpA
GetDriveTypeA
GetLogicalDrives
GetProcAddress
GetModuleHandleA
lstrcmpiA
HeapFree
HeapAlloc
GetProcessHeap
lstrcatA
GlobalUnlock
GlobalLock
CloseHandle
CreateProcessA
GetVersion
GetCurrentThreadId
GetCurrentProcessId
OutputDebugStringA
GetLastError
WideCharToMultiByte
GetVersionExA
GetSystemInfo
OpenMutexA
CompareStringW
CompareStringA
GetTimeZoneInformation
GetLocaleInfoW
HeapSize
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
ExitProcess
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
RtlUnwind
InitializeCriticalSection
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
Sleep
LCMapStringW
LCMapStringA
GetCurrentThread
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetModuleFileNameA
GetStdHandle
GlobalAlloc
lstrcpyA
lstrcpynA
GlobalFree
MultiByteToWideChar
lstrlenA
LoadLibraryA
WriteFile
HeapCreate
HeapDestroy
HeapReAlloc
VirtualAlloc
VirtualFree
EnterCriticalSection
FatalAppExitA
LeaveCriticalSection
DeleteCriticalSection
GetCommandLineA
SetEnvironmentVariableA
OpenClipboard
LoadIconA
RegisterClassA
FindWindowA
EnumWindows
GetClassNameA
IsWindowVisible
SetActiveWindow
BringWindowToTop
ShowWindow
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SetForegroundWindow
GetClientRect
CreateWindowExA
GetWindowLongA
GetWindowRect
CallWindowProcA
SetWindowPos
SetWindowsHookExA
WaitForInputIdle
GetTopWindow
GetWindow
IsClipboardFormatAvailable
ScreenToClient
GetClipboardData
EmptyClipboard
SetClipboardData
CloseClipboard
GetDlgCtrlID
SetFocus
LoadCursorA
SetCursor
FindWindowExA
PeekMessageA
PostQuitMessage
TranslateMessage
DispatchMessageA
DefWindowProcA
GetDlgItem
SendMessageA
wsprintfA
CheckRadioButton
IsWindowEnabled
GetParent
EnableWindow
CallNextHookEx
SetWindowLongA
MessageBoxA
GetStockObject
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
ShellExecuteExA
ShellExecuteA
IIDFromString
SysAllocStringLen
SysFreeString
PathStripToRootA
PathRelativePathToA
PathRemoveBackslashA
PathStripPathA
StrStrA
PathCanonicalizeA
ChangeMainFont
CreateControl
CreateFindWindow
FindAndActiveWindow
ForegroundWindow
GetMutex
GetOSVersionString
GetParamValue
GetParentPath
GetProductTypeFromCode
GetPropertyFromSNCode
InitBannerCtrl
InsertProductType
IsCorrectSerial
IsCorrectSerial2
LaunchProcess
Load
MessagePumping
Operator
PathIsSystemFile
ReadRegForMultiStr
RemoveExclameStr
RemoveItemFromRegMultiStr
SetALPassPath
SetInstalled
StrFind
SubClassALPass
SubClassBanner
SubClassCorpPage
SubClassCorpWithoutSNPage
SubClassMainDlg
SubClassMainFrame
TrimString
UnSubClassBanner
UnSubClassCorpPage
Unload
ValidPath
ValidRoot
VerifyUI
WaitUntilIdle
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ