Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
Static task
static1
Behavioral task
behavioral1
Sample
f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Arrays.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Arrays.dll
Resource
win10v2004-20240802-en
Target
f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118
Size
271KB
MD5
f1a79f9cba710bf8cc11122d6999d66d
SHA1
3756af4d51bb0511e5ef4319eaf7720b4c73194b
SHA256
b6cb0ed4ec3397234c1f67bef483ee62f45ca9d1becca3fa0c9fcbe3642acf9a
SHA512
3394ad10858ec3161c2e084f79a22ce74d6c1102581af4ef6576ec78eabe82fc9f5ee6c248d1389927a983c4385e905a5c559d711100bd391b6b80f76943c8ed
SSDEEP
6144:Kn/L+GOm9pZ9rBzo/pwwIIg8I32PkFVEXS:0zOm9r99/8y2PSaS
Checks for missing Authenticode signature.
resource |
---|
f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118 |
unpack001/$PLUGINSDIR/System.dll |
unpack001/Arrays.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFullPathNameA
MoveFileA
SearchPathA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
GetShortPathNameA
SetCurrentDirectoryA
Sleep
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetEnvironmentVariableA
GetWindowsDirectoryA
GetTempPathA
GetModuleHandleA
GetTickCount
CloseHandle
lstrlenA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
ReadFile
lstrcpyA
lstrcatA
GetSystemDirectoryA
GetVersion
GetProcAddress
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
CompareFileTime
SetFileTime
ExpandEnvironmentStringsA
lstrcmpiA
lstrcmpA
SetErrorMode
GlobalFree
LoadLibraryA
GetCommandLineA
MulDiv
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
LoadLibraryExA
FreeLibrary
EndDialog
ScreenToClient
GetWindowRect
RegisterClassA
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetAsyncKeyState
IsDlgButtonChecked
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
CreateWindowExA
SystemParametersInfoA
GetDlgItem
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
wvsprintfA
DispatchMessageA
PeekMessageA
LoadImageA
GetDC
ReleaseDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
GetClassInfoA
DialogBoxParamA
CharNextA
ExitWindowsEx
DestroyWindow
CreateDialogParamA
SetWindowTextA
PostQuitMessage
SetForegroundWindow
ShowWindow
SetWindowLongA
SendMessageTimeoutA
FindWindowExA
IsWindow
EmptyClipboard
SetClipboardData
OpenClipboard
FillRect
DrawTextA
EndPaint
wsprintfA
SetTimer
SelectObject
SetBkMode
CreateFontIndirectA
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
ImageList_Create
ord17
ImageList_Destroy
ImageList_AddMasked
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GlobalFree
GlobalSize
lstrcpynA
lstrcpyA
GetProcAddress
VirtualFree
FreeLibrary
lstrlenA
LoadLibraryA
GetModuleHandleA
GlobalAlloc
WideCharToMultiByte
VirtualAlloc
VirtualProtect
GetLastError
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
ReportEventA
CreatePipe
FlushFileBuffers
GetShortPathNameA
GetStartupInfoA
SetCurrentDirectoryW
WriteProfileSectionW
DialogBoxIndirectParamW
InvertRect
_35XSHD4
_4vmTaP2
_4xYtfmp64
_8FRHaSGrs
_8fyaLDm9q
_9gbwaeDqe
_AMcphs
_AbG8RR
_AkgkKK
_Cqg26De
_DPSwXn8P
_DwXG5
_E2EB8S4
_EPdBbLV
_FAjHfSHNC
_FzfB5pg
_H39Xb8U2
_HqPcyyDp
_NDHmKgsP
_PAMBNc
_Rskdfry
_RvMYdz2M
_SLk4FVk4
_TCXgnhtuX
_U5aHP5
_UFYb4
_VA8fpr
_VWmV93SCs
_VYUJPu6c
_WDcxk4cKx
_WrmWYr
_WxCRfg3Rv
_XWGr9qwF6
_XnCu6h
_XpL3q
_Y2PCU3xws
_YCpXk2j
_YDTsYh
_bDAUHc2d
_bsvBjz
_dASudzhxx
_ddFRtAEVk
_g9Fhfc8
_jby9dVTr
_mmG8KJ8
_n42Ke
_nfeBMfFV
_p89t4
_pP3Sz
_q2HPy
_qK3zMR6eV
_qcjGbYh2s
_qqbMVWg6
_rD2Yz
_seadq
_uDwRLxY9
_uaHHWM
_uneadPXU
_v6aLErng
_vh3aE6Np
_yRC2SEg
_zUAcyq
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ