Action
ActionEx
CheckIntegrity
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
EventInvoke
Install
SCEventInvoke
SetSysInfo
Version
Static task
static1
Behavioral task
behavioral1
Sample
15e606b73f8f700349fe83d615517b49_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15e606b73f8f700349fe83d615517b49_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Assist/$R0.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Assist/$R0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Assist/insthlper.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Assist/insthlper.dll
Resource
win10v2004-20240802-en
Target
15e606b73f8f700349fe83d615517b49_JaffaCakes118
Size
245KB
MD5
15e606b73f8f700349fe83d615517b49
SHA1
f41950d4a0a0fff43c68a3eb43bb5f4486685b85
SHA256
729429195090c7e813f394f9c30838fadbc32799ba912d6c8561facd056b5dbd
SHA512
739a0a9dae80be72c3876a1a5ceaca3d081f70dfc1ac899f3156b2d9a40dfd5093cf193d64ca7a797ce07d915257d1311a50e43808ccf528b15b6898ed2c5b17
SSDEEP
6144:rQNw4MHNlfYpMU1F1yRf3VoEnBiEMHRYGOo+qfSYiOj:rIO5Yz1FWVolvaz2SjOj
Checks for missing Authenticode signature.
resource |
---|
15e606b73f8f700349fe83d615517b49_JaffaCakes118 |
unpack001/Assist/$R0 |
unpack001/Assist/insthlper.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ImageList_AddMasked
ord17
ImageList_Destroy
ImageList_Create
SetErrorMode
GetExitCodeProcess
WaitForSingleObject
ExpandEnvironmentStringsA
GetEnvironmentVariableA
lstrcmpiA
FindNextFileA
DeleteFileA
FindFirstFileA
SetFileTime
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
CreateFileA
GetFileSize
GetModuleFileNameA
GetTickCount
GetModuleHandleA
ExitProcess
lstrcpynA
GetCommandLineA
GetWindowsDirectoryA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GetVersion
GlobalUnlock
GlobalLock
GlobalAlloc
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
GetSystemDirectoryA
EnterCriticalSection
Sleep
LeaveCriticalSection
InitializeCriticalSection
CloseHandle
GlobalFree
LoadLibraryA
GetProcAddress
CreateThread
FreeLibrary
MultiByteToWideChar
GetCurrentProcess
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
MulDiv
CopyFileA
CharNextA
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
EndDialog
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
ExitWindowsEx
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
PostQuitMessage
GetDeviceCaps
CreateFontIndirectA
DeleteObject
CreateBrushIndirect
CreateFontA
SetBkMode
SetTextColor
SetBkColor
SelectObject
RegEnumValueA
RegEnumKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyA
RegCloseKey
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
lstrcpyA
lstrcmpiA
WaitForSingleObject
GetTickCount
GetTempPathA
GetPrivateProfileSectionA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetPrivateProfileStringA
MultiByteToWideChar
lstrcatA
ReadFile
SetFilePointer
WideCharToMultiByte
WinExec
LockResource
SizeofResource
LoadResource
FindResourceA
CloseHandle
GetACP
CreateDirectoryA
GetEnvironmentVariableA
RemoveDirectoryA
FindClose
FindNextFileA
FindFirstFileA
GetWindowsDirectoryA
MoveFileExA
CopyFileA
ExpandEnvironmentStringsA
GetCurrentProcess
InterlockedDecrement
SetEvent
WaitForMultipleObjects
ResetEvent
CreateEventA
lstrlenW
LoadLibraryExA
SetErrorMode
LocalFree
GetSystemDirectoryA
CreateProcessA
GetVolumeInformationA
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
DisableThreadLibraryCalls
GetShortPathNameA
GetTempFileNameA
InterlockedExchange
GlobalAlloc
DeviceIoControl
GlobalFree
CreateFileA
GetVersionExA
VirtualQuery
GetModuleFileNameA
DeleteFileA
MoveFileA
GetLocalTime
SystemTimeToFileTime
FileTimeToSystemTime
lstrlenA
CallWindowProcW
GetClassNameA
MessageBoxA
GetDesktopWindow
EnableWindow
SetWindowTextA
GetForegroundWindow
IsIconic
SetWindowLongA
CallWindowProcA
PostQuitMessage
PeekMessageA
GetPropA
GetParent
GetClientRect
FlashWindowEx
PostMessageA
FindWindowExA
wsprintfA
LoadIconA
LoadStringA
IsWindow
LoadBitmapA
DestroyWindow
DestroyIcon
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
IsDialogMessageA
GetMessageA
ShowWindow
SetWindowPos
ScreenToClient
GetWindowRect
GetDlgItem
CreateDialogParamA
RemovePropA
KillTimer
SetTimer
SetPropA
SendMessageA
IsWindowUnicode
SetWindowLongW
GetSystemMetrics
SetForegroundWindow
GetAncestor
GetCapture
GetDC
GetMessagePos
GetSysColor
ReleaseDC
SetCapture
ReleaseCapture
LoadCursorA
SetCursor
BeginPaint
GetWindowTextA
DrawTextA
EndPaint
DialogBoxParamA
InvalidateRect
CheckDlgButton
IsDlgButtonChecked
EndDialog
ExitWindowsEx
SetDlgItemTextA
LoadImageA
IsWindowVisible
GetObjectA
GetPixel
SelectObject
SetTextColor
CreateFontIndirectA
SetBkColor
DeleteObject
AdjustTokenPrivileges
RegCreateKeyExA
RegOpenKeyA
RegEnumValueA
OpenProcessToken
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
GetUserNameA
LookupPrivilegeValueA
ShellExecuteA
StringFromIID
OleInitialize
CoGetMalloc
CoUninitialize
CoInitialize
CoCreateInstance
CLSIDFromString
OleUninitialize
SysAllocString
RegisterTypeLi
SysStringByteLen
SysAllocStringByteLen
VariantInit
SysFreeString
VariantClear
LoadTypeLi
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
PathAppendA
SHDeleteValueA
SHDeleteEmptyKeyA
SHRegOpenUSKeyA
SHRegEnumUSKeyA
SHRegCloseUSKey
SHDeleteKeyA
PathFileExistsA
SHGetValueA
SHSetValueA
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
URLDownloadToFileA
Netbios
_strupr
_itoa
_mbsnbcpy
_snprintf
atol
memcpy
strlen
_mbsstr
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
_onexit
__dllonexit
_CxxThrowException
toupper
wcscpy
wcslen
wcscmp
_mbsnbcmp
_mbscmp
_stricmp
rewind
_strnicmp
fwrite
_ftol
sprintf
strchr
sscanf
srand
rand
free
fread
malloc
atoi
time
strstr
_beginthreadex
_except_handler3
strcmp
memcmp
fgets
_mbsicmp
strncat
_strlwr
strcpy
isalnum
memmove
??2@YAPAXI@Z
_vsnprintf
strcat
fopen
fseek
fprintf
ftell
fclose
strncpy
strrchr
__CxxFrameHandler
memset
_mbsnbcat
SetupIterateCabinetA
HttpSendRequestA
InternetOpenA
HttpOpenRequestA
InternetConnectA
InternetGetConnectedState
InternetCrackUrlA
HttpQueryInfoA
InternetSetStatusCallback
InternetCloseHandle
InternetReadFile
Action
ActionEx
CheckIntegrity
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
EventInvoke
Install
SCEventInvoke
SetSysInfo
Version
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
fclose
strcat
fgets
ftell
fseek
fwrite
strstr
strlen
memset
??2@YAPAXI@Z
_snprintf
??3@YAXPAX@Z
toupper
fopen
_strnicmp
MoveFileExA
GetVersionExA
GetWindowsDirectoryA
SHGetValueA
SHDeleteValueA
func1
func2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ