download
download_quiet
Overview
overview
7Static
static
3020ff73ad2...18.exe
windows7-x64
7020ff73ad2...18.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3SearchBar.msi
windows7-x64
6SearchBar.msi
windows10-2004-x64
6setup.exe
windows7-x64
7setup.exe
windows10-2004-x64
7{3D098A34-...ngs.js
windows7-x64
3{3D098A34-...ngs.js
windows10-2004-x64
3{3D098A34-...ble.js
windows7-x64
3{3D098A34-...ble.js
windows10-2004-x64
3{3D098A34-...er.htm
windows7-x64
3{3D098A34-...er.htm
windows10-2004-x64
3{3D098A34-...md5.js
windows7-x64
3{3D098A34-...md5.js
windows10-2004-x64
3{3D098A34-...ser.js
windows7-x64
3{3D098A34-...ser.js
windows10-2004-x64
3{3D098A34-...ons.js
windows7-x64
3{3D098A34-...ons.js
windows10-2004-x64
3{3D098A34-...bs.htm
windows7-x64
3{3D098A34-...bs.htm
windows10-2004-x64
3{3D098A34-.../tb.js
windows7-x64
3{3D098A34-.../tb.js
windows10-2004-x64
3{3D098A34-...rts.js
windows7-x64
3{3D098A34-...rts.js
windows10-2004-x64
3{3D098A34-...ups.js
windows7-x64
3{3D098A34-...ups.js
windows10-2004-x64
3{3D098A34-...ups.js
windows7-x64
3{3D098A34-...ups.js
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
020ff73ad27d28d88d5c4be975fdd818_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
020ff73ad27d28d88d5c4be975fdd818_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
SearchBar.msi
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SearchBar.msi
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/ask_settings.js
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/ask_settings.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/bubble.js
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/bubble.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/jscontainer.htm
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/jscontainer.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/md5.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/md5.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/minibrowser.js
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/minibrowser.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/options.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/options.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/tabs.htm
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/tabs.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/tb.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/tb.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/tb_alerts.js
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/tb_alerts.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/tb_allow_popups.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/tb_allow_popups.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/tb_block_popups.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
{3D098A34-4D9F-4873-A333-229BB80BF7F2}/chrome/content/id_ff_test/tb_block_popups.js
Resource
win10v2004-20240802-en
Target
020ff73ad27d28d88d5c4be975fdd818_JaffaCakes118
Size
1.7MB
MD5
020ff73ad27d28d88d5c4be975fdd818
SHA1
bd4501aec25e849bd57c4b263b78d8d1ae70252b
SHA256
b54949934cd07db73dbc76d200a68ccc4c7846fb46d863308026ba45cf890bde
SHA512
a9060366eb552ad08b80a9dbc041afb9146b3e2beac7c693c5f0a1144caead742198f58ae0648a7fe0bd9072c0ef32dbe1c355357bdd10c253031bfb17f4d861
SSDEEP
49152:EvO0LHm5J3pttmghQ+hvTKQc2yEnP2ddpkePx/:4eJ3p2gj1KQcYIdpkePt
Checks for missing Authenticode signature.
resource |
---|
020ff73ad27d28d88d5c4be975fdd818_JaffaCakes118 |
unpack001/$PLUGINSDIR/NSISdl.dll |
unpack001/$PLUGINSDIR/ZipDLL.dll |
unpack002/setup.exe |
resource | yara_rule |
---|---|
sample | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControls
CreateBrushIndirect
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SelectObject
SetBkColor
SetBkMode
SetTextColor
CloseHandle
CompareFileTime
CopyFileA
CreateDirectoryA
CreateFileA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetDiskFreeSpaceA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersion
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
LoadLibraryExA
MoveFileA
MulDiv
MultiByteToWideChar
ReadFile
RemoveDirectoryA
SearchPathA
SetCurrentDirectoryA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetFileTime
Sleep
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpynA
lstrlenA
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
SHBrowseForFolderA
SHFileOperationA
SHGetFileInfoA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
AppendMenuA
BeginPaint
CallWindowProcA
CharNextA
CharPrevA
CheckDlgButton
CloseClipboard
CreateDialogParamA
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawTextA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
ExitWindowsEx
FillRect
FindWindowExA
GetClassInfoA
GetClientRect
GetDC
GetDlgItem
GetDlgItemTextA
GetMessagePos
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowLongA
GetWindowRect
InvalidateRect
IsWindow
IsWindowEnabled
IsWindowVisible
LoadBitmapA
LoadCursorA
LoadImageA
MessageBoxIndirectA
OpenClipboard
PeekMessageA
PostQuitMessage
RegisterClassA
ScreenToClient
SendMessageA
SendMessageTimeoutA
SetClassLongA
SetClipboardData
SetCursor
SetDlgItemTextA
SetForegroundWindow
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TrackPopupMenu
wsprintfA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
CloseHandle
CreateFileA
CreateSemaphoreA
CreateThread
DeleteFileA
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetTickCount
GlobalAlloc
GlobalFree
InterlockedDecrement
InterlockedIncrement
MulDiv
ReleaseSemaphore
SetLastError
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
_write
__dllonexit
_errno
_iob
abort
fflush
fputc
fputs
free
fwrite
malloc
memcpy
realloc
strcmp
strcpy
strlen
CallWindowProcA
CharPrevA
CreateWindowExA
DestroyWindow
EnableWindow
FindWindowExA
GetClientRect
GetDlgItem
GetFocus
GetWindowLongA
GetWindowRect
IsWindowVisible
RegisterWindowMessageA
SendMessageA
SetDlgItemTextA
SetWindowLongA
SetWindowTextA
ShowWindow
wsprintfA
WSACleanup
WSAGetLastError
WSAStartup
__WSAFDIsSet
closesocket
connect
gethostbyname
getsockname
htons
inet_addr
ioctlsocket
recv
select
send
shutdown
socket
download
download_quiet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpiA
GlobalFree
lstrcpyA
lstrcpynA
GlobalAlloc
GetLocaleInfoW
LoadLibraryA
IsBadCodePtr
LocalFree
FormatMessageA
GetLastError
MapViewOfFile
CreateFileMappingA
CloseHandle
UnmapViewOfFile
GetDiskFreeSpaceA
CreateFileA
GetCurrentDirectoryA
SetFileAttributesA
GetFileAttributesA
GetDriveTypeA
SetVolumeLabelA
DeleteFileA
MoveFileA
CreateDirectoryA
EnterCriticalSection
Sleep
InitializeCriticalSection
InterlockedExchange
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
MultiByteToWideChar
RtlUnwind
GetCommandLineA
GetVersion
HeapFree
HeapReAlloc
HeapAlloc
RaiseException
GetTimeZoneInformation
GetSystemTime
GetLocalTime
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
SetEnvironmentVariableA
SetCurrentDirectoryA
GetFileType
FlushFileBuffers
SetStdHandle
ExitProcess
LCMapStringA
LCMapStringW
GetCPInfo
CompareStringA
CompareStringW
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
TerminateProcess
GetCurrentProcess
HeapSize
SetHandleCount
GetStdHandle
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
SetEndOfFile
ReadFile
SetFilePointer
GetACP
GetOEMCP
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetProcAddress
GetStringTypeA
GetStringTypeW
IsBadReadPtr
SendMessageA
GetDlgItem
SetWindowTextA
FindWindowExA
OemToCharBuffA
CharToOemBuffA
extractall
extractfile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
setup.pdb
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcessId
GetNativeSystemInfo
SetFilePointer
HeapSetInformation
CreateEventW
SetEvent
SizeofResource
LockResource
LoadResource
FindResourceW
GetVersionExW
CompareStringW
GetFileAttributesW
GetModuleFileNameW
ExpandEnvironmentStringsW
GlobalFree
OpenProcess
GetSystemDirectoryW
DeleteFileW
GetTempFileNameW
GetTempPathW
LocalFree
FormatMessageW
ReadFile
GetTimeFormatW
GetDateFormatW
CreateDirectoryW
CopyFileW
WideCharToMultiByte
GetWindowsDirectoryW
GetSystemInfo
GetCurrentProcess
GetEnvironmentVariableW
GetModuleHandleW
GetVersion
CreateFileW
EndUpdateResourceW
Sleep
GetDiskFreeSpaceExW
DeleteCriticalSection
CreateThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
MulDiv
lstrlenW
GetExitCodeProcess
SetEndOfFile
GetTickCount
FindFirstFileW
FindNextFileW
FindClose
GlobalAlloc
LoadLibraryW
UpdateResourceA
BeginUpdateResourceA
InterlockedCompareExchange
FindResourceA
DeleteFileA
lstrlenA
CreateFileA
UpdateResourceW
BeginUpdateResourceW
GetEnvironmentVariableA
SetStdHandle
WriteConsoleW
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetProcessHeap
MultiByteToWideChar
LCMapStringW
GetStringTypeW
GetLocaleInfoW
IsValidCodePage
GetOEMCP
GetACP
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
HeapAlloc
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
QueryPerformanceCounter
HeapCreate
GetCurrentThreadId
InterlockedExchange
SwitchToThread
GetLastError
WaitForSingleObject
CloseHandle
GetProcAddress
FreeLibrary
WriteFile
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
RaiseException
GetCommandLineW
GetStartupInfoW
RtlUnwind
HeapFree
InterlockedDecrement
GetCPInfo
SetUnhandledExceptionFilter
ExitProcess
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStockObject
EnumFontFamiliesExW
CreateFontIndirectW
DeleteObject
CreateCompatibleDC
GetDeviceCaps
GetObjectW
DeleteDC
SelectObject
GetTextMetricsW
GetTextExtentPoint32W
CoUninitialize
CoInitialize
GetComputerObjectNameW
ShellExecuteExW
SHGetMalloc
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteW
ShellExecuteA
MessageBoxA
ShowScrollBar
GetClientRect
SendMessageA
SetClassLongW
SetWindowTextW
LoadCursorW
SetCursor
CreateDialogIndirectParamW
SetForegroundWindow
EnableWindow
GetFocus
SetFocus
ScreenToClient
MoveWindow
LoadIconW
SetDlgItemTextW
SendMessageW
GetDlgItem
MsgWaitForMultipleObjects
PeekMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
DestroyWindow
ShowWindow
SendDlgItemMessageW
GetWindowRect
SystemParametersInfoW
ExitWindowsEx
MessageBoxW
DrawTextW
GetSystemMetrics
GetDC
GetDialogBaseUnits
ReleaseDC
CreateDialogParamW
LoadImageW
CertFreeCertificateChain
CertVerifyCertificateChainPolicy
CertGetCertificateChain
InternetCrackUrlW
InternetCombineUrlW
ord8
ord150
ord78
ord92
_DecodePointerInternal@4
_EncodePointerInternal@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ