Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
Static task
static1
Behavioral task
behavioral1
Sample
d06bcb8239ac95548e5c6aa2167cdc56_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d06bcb8239ac95548e5c6aa2167cdc56_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ProxySettings.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ProxySettings.dll
Resource
win10v2004-20241007-en
Target
d06bcb8239ac95548e5c6aa2167cdc56_JaffaCakes118
Size
270KB
MD5
d06bcb8239ac95548e5c6aa2167cdc56
SHA1
d3d11254999b6bede1a971a7d16af3e726a1bab9
SHA256
3e51ccd8f1f298ea9fdb6fdb72a34e4d963efd77d94d72563dc2c56c98eb5329
SHA512
e77bec59496ce7cfd33fec5b72e4fcbb2c2e8171aa51a622247476827ec644d6b3e91174ee74718200c1f5ce59481bf45db8d21f60d6c9c359e18a32f4f0de18
SSDEEP
6144:Kn/L+GOmtI2Fv6xDuf5sJFjSJnHY9ImCmUaXDjdx2WSJbxV1iF:0zOmtLFyxqREsn4KmRXdxNSjPiF
Checks for missing Authenticode signature.
resource |
---|
d06bcb8239ac95548e5c6aa2167cdc56_JaffaCakes118 |
unpack001/$PLUGINSDIR/System.dll |
unpack001/ProxySettings.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFullPathNameA
MoveFileA
SearchPathA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
GetShortPathNameA
SetCurrentDirectoryA
Sleep
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetEnvironmentVariableA
GetWindowsDirectoryA
GetTempPathA
GetModuleHandleA
GetTickCount
CloseHandle
lstrlenA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
ReadFile
lstrcpyA
lstrcatA
GetSystemDirectoryA
GetVersion
GetProcAddress
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
CompareFileTime
SetFileTime
ExpandEnvironmentStringsA
lstrcmpiA
lstrcmpA
SetErrorMode
GlobalFree
LoadLibraryA
GetCommandLineA
MulDiv
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
LoadLibraryExA
FreeLibrary
EndDialog
ScreenToClient
GetWindowRect
RegisterClassA
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetAsyncKeyState
IsDlgButtonChecked
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
CreateWindowExA
SystemParametersInfoA
GetDlgItem
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
wvsprintfA
DispatchMessageA
PeekMessageA
LoadImageA
GetDC
ReleaseDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
GetClassInfoA
DialogBoxParamA
CharNextA
ExitWindowsEx
DestroyWindow
CreateDialogParamA
SetWindowTextA
PostQuitMessage
SetForegroundWindow
ShowWindow
SetWindowLongA
SendMessageTimeoutA
FindWindowExA
IsWindow
EmptyClipboard
SetClipboardData
OpenClipboard
FillRect
DrawTextA
EndPaint
wsprintfA
SetTimer
SelectObject
SetBkMode
CreateFontIndirectA
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
ImageList_Create
ord17
ImageList_Destroy
ImageList_AddMasked
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GlobalFree
GlobalSize
lstrcpynA
lstrcpyA
GetProcAddress
VirtualFree
FreeLibrary
lstrlenA
LoadLibraryA
GetModuleHandleA
GlobalAlloc
WideCharToMultiByte
VirtualAlloc
VirtualProtect
GetLastError
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
StrAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
GetCommProperties
SetCommState
TlsFree
EnableScrollBar
GetDCEx
GetSysColor
RemoveMenu
SetMenuContextHelpId
TranslateAcceleratorW
_2C6FdH58R
_4fFP5
_4j2CXwb
_59JNd
_6DMHSsw
_6U8Bm
_96fvqpKJ
_9aphzrq
_9dmrKY
_AypDn
_Cd3KfvR
_Cfhhjut
_CwTzH
_DyMjx
_GBccpM3
_GVbccbMKE
_JEcRK
_JbR5B
_JmBEh
_KP6rbW
_Knf3V
_KxTcCC4W
_NnGkWSk
_P9ufBdu
_Rh3nN
_S85KEGph
_SddJws6t
_TGVKL8
_TMCTh
_WSthdLcY
_XwmsYmKXr
_YmT5qcvGq
_bFjb4gpMG
_bSkcm
_bkp5U
_deBHvJ8L
_f8VsDes
_g82b8M
_jLB6kDz4
_kPtPHMdA3
_kScTMgTv
_ns4Wh
_pSvJkRXd
_phJqT6
_pwEpqg
_qd9GKH
_qsar4
_rWvxhyUE
_rjs4ESw
_sVT9D
_vaM3r
_vjgeHksC
_wLe45X9
_wszSsC
_xngdxVn
_zqW6SpmpD
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ