ahaty
bpuzplozj
ccri
einpppjgj
hwhoyd
kvqdsz
lppo
pthfhtcqh
swohdluyyih
vrpvwvdy
wudmv
Static task
static1
Behavioral task
behavioral1
Sample
70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/orcyebry.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/orcyebry.dll
Resource
win10v2004-20241007-en
Target
JaffaCakes118_30fc1041b3c56d616a7e19750bf513a80578167a45d6e0ff359fa6b6c31c50c7
Size
347KB
MD5
1f902fd086c25392ab5b3b99520c3132
SHA1
41f3f7c0c5dcc531f4f2b4107c5a92c309277a2a
SHA256
30fc1041b3c56d616a7e19750bf513a80578167a45d6e0ff359fa6b6c31c50c7
SHA512
533cdec3c7b7b50ef42341da4df27585085aeeeecd0245a2e7ea6c4208270e46194a01f5290f819177204d6cfa7c2f809ae63d1385df023aa4f177a0ee5da836
SSDEEP
6144:kWxAlzz5l78a5sG5+B9LOUQKXry1S4KEwxtNWXtyJlUHINhrA4W0juCzVk4k:dAlzAa5/+BNS7S3xmtyzqQxDW0pzS4k
Checks for missing Authenticode signature.
resource |
---|
unpack001/70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156 |
unpack002/$PLUGINSDIR/orcyebry.dll |
resource | yara_rule |
---|---|
static1/unpack001/70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156 | nsis_installer_1 |
static1/unpack001/70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156 | nsis_installer_2 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHRegDeleteUSValueA
PathMakePrettyA
StrCmpIW
PathFileExistsA
PathIsSystemFolderA
PathRemoveExtensionA
PathRelativePathToW
PathIsUNCServerA
PathAddExtensionW
StrChrA
SHQueryInfoKeyA
PathMatchSpecW
OleCreateLinkFromDataEx
OleDestroyMenuDescriptor
OleQueryCreateFromData
SNB_UserUnmarshal
OleGetClipboard
CreateClassMoniker
UnloadPerfCounterTextStringsA
LoadPerfCounterTextStringsW
LoadPerfCounterTextStringsA
SetWindowContextHelpId
ToUnicodeEx
EnumClipboardFormats
MapDialogRect
GetLastActivePopup
GetKeyboardLayoutNameA
SetFocus
PostMessageA
GetWindowContextHelpId
CreateCursor
IsColorProfileTagPresent
OpenColorProfileA
GetColorDirectoryA
WSAStartup
ord1106
WSAAsyncGetHostByName
ioctlsocket
connect
WSAAsyncGetServByName
ord1130
setsockopt
MigrateWinsockConfiguration
sendto
ord1116
ahaty
bpuzplozj
ccri
einpppjgj
hwhoyd
kvqdsz
lppo
pthfhtcqh
swohdluyyih
vrpvwvdy
wudmv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ