Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
Overview
overview
10Static
static
30535498d42...18.exe
windows7-x64
100535498d42...18.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3NsResize.dll
windows7-x64
3NsResize.dll
windows10-2004-x64
3dbtoepub
ubuntu-18.04-amd64
1dbtoepub
debian-9-armhf
1dbtoepub
debian-9-mips
1dbtoepub
debian-9-mipsel
1Static task
static1
Behavioral task
behavioral1
Sample
0535498d42c6e270db089f64b34f8d02_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0535498d42c6e270db089f64b34f8d02_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
NsResize.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
NsResize.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
dbtoepub
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
dbtoepub
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
dbtoepub
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
dbtoepub
Resource
debian9-mipsel-20240729-en
Target
0535498d42c6e270db089f64b34f8d02_JaffaCakes118
Size
265KB
MD5
0535498d42c6e270db089f64b34f8d02
SHA1
de69e268189946ca5c68b56fe20ed85d2ff1a5d9
SHA256
ff07c101a62eff24ac18b8e5c7a4830fdcbde62f1ba097a55b0c21c2709b7c09
SHA512
62154dbcdcd408adc45e9b1a3a5f9259a50858559bc5148df937a52cc5267107c58c2e3c5f909b465cac797c2521e9861d3c9aa53c2b1e89c33405904241a530
SSDEEP
6144:Kn/L+GOmio4eHSN4q4nCQGHiAv9atOl6n8myaVNv:0zOmVySq4Cgw9asl68kT
Checks for missing Authenticode signature.
resource |
---|
0535498d42c6e270db089f64b34f8d02_JaffaCakes118 |
unpack001/$PLUGINSDIR/System.dll |
unpack001/NsResize.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFullPathNameA
MoveFileA
SearchPathA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
GetShortPathNameA
SetCurrentDirectoryA
Sleep
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetEnvironmentVariableA
GetWindowsDirectoryA
GetTempPathA
GetModuleHandleA
GetTickCount
CloseHandle
lstrlenA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
ReadFile
lstrcpyA
lstrcatA
GetSystemDirectoryA
GetVersion
GetProcAddress
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
CompareFileTime
SetFileTime
ExpandEnvironmentStringsA
lstrcmpiA
lstrcmpA
SetErrorMode
GlobalFree
LoadLibraryA
GetCommandLineA
MulDiv
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
LoadLibraryExA
FreeLibrary
EndDialog
ScreenToClient
GetWindowRect
RegisterClassA
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetAsyncKeyState
IsDlgButtonChecked
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
CreateWindowExA
SystemParametersInfoA
GetDlgItem
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
wvsprintfA
DispatchMessageA
PeekMessageA
LoadImageA
GetDC
ReleaseDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
GetClassInfoA
DialogBoxParamA
CharNextA
ExitWindowsEx
DestroyWindow
CreateDialogParamA
SetWindowTextA
PostQuitMessage
SetForegroundWindow
ShowWindow
SetWindowLongA
SendMessageTimeoutA
FindWindowExA
IsWindow
EmptyClipboard
SetClipboardData
OpenClipboard
FillRect
DrawTextA
EndPaint
wsprintfA
SetTimer
SelectObject
SetBkMode
CreateFontIndirectA
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
ImageList_Create
ord17
ImageList_Destroy
ImageList_AddMasked
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GlobalFree
GlobalSize
lstrcpynA
lstrcpyA
GetProcAddress
VirtualFree
FreeLibrary
lstrlenA
LoadLibraryA
GetModuleHandleA
GlobalAlloc
WideCharToMultiByte
VirtualAlloc
VirtualProtect
GetLastError
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
GetFileAttributesExA
SearchPathW
SetThreadPriority
DeferWindowPos
GetWindowModuleFileNameW
IsCharAlphaA
IsCharUpperA
_3xebYSMX9
_8R3uJ3k
_8yYKpRp
_AGedBzWB2
_FFPncaaD
_Fc9hWCnz
_KBNEfR6ag
_SrEHhTeqN
_TmN4q
_VFznuzfw
_W9eR6hV
_WcWmr
_WyprsJP
_X5dL3LCyt
_XcFw9Pm
_XuHzHx
_edBrrz
_fuR3CL
_gJKMf
_hAgV9kK4R
_ha8EC
_hyWpW5
_kFzR9Ct
_kvB65
_m2zHMmJh9
_n5yP8BSJh
_nhdjSRfu6
_pDRG6P4F
_pHMk8Wq
_pcb6vT3y
_rBAb8wLCw
_rPGhXRB
_tGj5VG45
_uaynM4Uv
_ujscqy
_wP9gaxvp9
_wXUrB8zkb
_zDHCfKs
_zkVwwH9zV
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ