dialog
initDialog
show
Overview
overview
7Static
static
7279e532cf5...18.exe
windows7-x64
7279e532cf5...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$R0.dll
windows7-x64
3$R0.dll
windows10-2004-x64
3$TEMP/$1.dll
windows7-x64
5$TEMP/$1.dll
windows10-2004-x64
5Behavioral task
behavioral1
Sample
279e532cf5f41efceb7f178d0f00b971_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
279e532cf5f41efceb7f178d0f00b971_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$R0.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$R0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$TEMP/$1.dll
Resource
win7-20240708-en
Target
279e532cf5f41efceb7f178d0f00b971_JaffaCakes118
Size
968KB
MD5
279e532cf5f41efceb7f178d0f00b971
SHA1
40e586400ab0f91ec817751d6ec8d3d7acf35e19
SHA256
bba191609d4c45397ad0dbc88da7eaf74dc53acbdefa45387ee7a676620b8e39
SHA512
7cf369ec18d6996693333908f036758c9da882080aa4046c451e2ac73af68eadd963111ba210e85fc3215218b34f3e7bf3455e8b2d54822ed7639e9051a31916
SSDEEP
24576:khYKa1MHPJr0hntOUAl/2sSFgoe10dCGkKz:DH1MHPJrGOll6cu
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/$TEMP/$1 | acprotect |
resource | yara_rule |
---|---|
sample | upx |
static1/unpack001/$TEMP/$1 | upx |
Checks for missing Authenticode signature.
resource |
---|
279e532cf5f41efceb7f178d0f00b971_JaffaCakes118 |
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$R0 |
unpack001/$TEMP/$1 |
unpack002/out.upx |
unpack001/out.upx |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
GetPrivateProfileIntA
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
MultiByteToWideChar
GlobalAlloc
GetDlgCtrlID
GetClientRect
SetWindowRgn
MapWindowPoints
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
PtInRect
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
LoadIconA
SetTextColor
GetObjectA
SelectObject
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
CreateCompatibleDC
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
CloseHandle
GetCurrentProcess
TerminateProcess
OpenProcess
CopyFileA
CreateProcessA
InterlockedIncrement
DebugBreak
OutputDebugStringA
GetFileTime
OpenFile
GetEnvironmentVariableA
LoadLibraryA
MultiByteToWideChar
WaitForSingleObject
WriteFile
SetFilePointer
FreeLibrary
WideCharToMultiByte
lstrlenW
FindNextFileA
GetTickCount
GetSystemTime
GlobalMemoryStatus
RemoveDirectoryA
ReadFile
GetFileSize
GetModuleHandleA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcessId
ReadProcessMemory
UnmapViewOfFile
GetACP
MapViewOfFile
CreateFileMappingA
FlushFileBuffers
GetProcessHeap
lstrcpynA
SetFileAttributesA
DeleteFileA
MoveFileExA
GetPrivateProfileSectionA
WritePrivateProfileSectionA
CreateDirectoryA
SearchPathA
GetTempPathA
ExpandEnvironmentStringsA
VirtualQuery
GetModuleFileNameA
LocalFree
GetCurrentDirectoryA
GetLongPathNameA
GetShortPathNameA
FindFirstFileA
FindClose
GetFileAttributesA
GetVersionExA
GetWindowsDirectoryA
lstrlenA
GetSystemDirectoryA
InterlockedDecrement
GetLastError
CreateFileA
DestroyIcon
CharLowerA
wsprintfA
LoadStringA
wvsprintfA
CharNextA
SendMessageA
IsWindow
TranslateMessage
DispatchMessageA
PeekMessageA
RegOpenKeyA
GetExplicitEntriesFromAclA
DeleteAce
LookupAccountSidA
SetEntriesInAclA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
GetUserNameA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
CloseServiceHandle
EnumServicesStatusA
OpenSCManagerA
GetTokenInformation
ControlService
QueryServiceStatus
OpenServiceA
DeleteService
SetNamedSecurityInfoA
SHGetSpecialFolderPathA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetFileInfoA
CoGetMalloc
CoInitialize
CoCreateInstance
CoUninitialize
StringFromCLSID
SHSetValueA
SHGetValueA
StrStrIA
SHEnumValueA
SHDeleteValueA
SHDeleteKeyA
PathFindFileNameA
PathFindExtensionA
_adjust_fdiv
_initterm
?terminate@@YAXXZ
_onexit
__dllonexit
vsprintf
strncmp
_mbsicmp
_ismbcspace
_strdup
strncat
_strlwr
_mbsnbcmp
isalnum
fputs
time
ctime
localtime
_mbsstr
memmove
_mbscmp
sprintf
_wcsicmp
_except_handler3
fopen
rewind
fgets
_strnicmp
fseek
fprintf
fclose
atoi
_ismbcdigit
wcslen
atol
_stricmp
_mbsnbcpy
_read
_close
_lseek
_tell
_open
malloc
_snprintf
__CxxFrameHandler
??2@YAPAXI@Z
strrchr
strchr
strncpy
strstr
free
WSCEnumProtocols
WSCGetProviderPath
htonl
WSAStartup
WSACleanup
htons
EnumProcessModules
GetModuleFileNameExA
EnumProcesses
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
HttpAddRequestHeadersA
InternetReadFile
InternetCloseHandle
HttpOpenRequestA
InternetOpenA
InternetConnectA
HttpSendRequestA
ADDebug
EngCount
EngDelete
EngDisable
EngEnable
EngGetGroup
EngGetNext
EngGetReport
EngInit
EngLib_Init
EngLoad
EngPost
EngRemove
EngSetLoadDisabled
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ