Extended Key Usages
ExtKeyUsageCodeSigning
Overview
overview
7Static
static
3DEAMON~1.exe
windows7-x64
7DEAMON~1.exe
windows10-2004-x64
7DTPRO4~1.exe
windows7-x64
1DTPRO4~1.exe
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...lp.dll
windows7-x64
3$PLUGINSDI...lp.dll
windows10-2004-x64
3$TEMP/"SPTDinst.exe
windows7-x64
1$TEMP/"SPTDinst.exe
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
DEAMON~1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
DEAMON~1.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
DTPRO4~1.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
DTPRO4~1.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/setuphlp.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/setuphlp.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$TEMP/"SPTDinst.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$TEMP/"SPTDinst.exe
Resource
win10v2004-20240226-en
Target
fb29582f4ecc3976a5b49a986ea26bc5_JaffaCakes118
Size
6.9MB
MD5
fb29582f4ecc3976a5b49a986ea26bc5
SHA1
9e92abdf0e475a328418a562053d3453d50ad752
SHA256
47a7a3c602796733c933e8f777b92ceb2cd8cf780727f52f11099b2a99957602
SHA512
d9a327bd99fee72984154cb8c3aadef2ab6dd6c0d696ba987a607ea6745b1180b77d9cb2df1620c1c8b79a841f447753ebcb2d9c0e5f43c129b5fb3446b06479
SSDEEP
196608:k6sGTRJEX+sxfB9pEeV+969bS7wI3of7Au1exn:k6sGlJE7IIA6FSMa+Atn
Checks for missing Authenticode signature.
resource |
---|
unpack001/DEAMON~1.EXE |
unpack002/$PLUGINSDIR/System.dll |
resource | yara_rule |
---|---|
static1/unpack001/DTPRO4~1.EXE | nsis_installer_1 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FindResourceA
GetComputerNameA
GetVolumeInformationA
GetDriveTypeA
LoadResource
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetStartupInfoA
LockResource
SizeofResource
FreeResource
GetModuleFileNameA
FreeLibrary
GetShortPathNameA
FindWindowA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetUserNameA
ShellExecuteA
_XcptFilter
strcat
strcpy
strlen
fclose
fread
malloc
ftell
fseek
fopen
memcmp
sprintf
exit
fwrite
memcpy
memset
free
sscanf
strncat
realloc
_exit
strncpy
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
FindNextUrlCacheEntryA
InternetOpenUrlA
InternetOpenA
FindCloseUrlCache
InternetCloseHandle
FindFirstUrlCacheEntryA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
ImageList_AddMasked
ImageList_Destroy
ImageList_Create
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetModuleHandleA
SetErrorMode
GetExitCodeProcess
WaitForSingleObject
ExpandEnvironmentStringsA
GetEnvironmentVariableA
lstrcmpiA
CloseHandle
SetFileTime
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
LoadLibraryA
ExitProcess
GetCurrentProcess
CopyFileA
lstrcpynA
GetCommandLineA
GetWindowsDirectoryA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
CreateProcessA
GetTempFileNameA
lstrcpyA
lstrlenA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetSystemDirectoryA
RemoveDirectoryA
GlobalFree
MulDiv
GetProcAddress
FreeLibrary
MultiByteToWideChar
DeleteFileA
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
SetWindowTextA
SetTimer
DestroyWindow
CreateDialogParamA
ExitWindowsEx
CharNextA
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
ScreenToClient
GetMessagePos
CallWindowProcA
IsWindowVisible
LoadBitmapA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuA
CreatePopupMenu
GetSystemMetrics
EndDialog
SetClassLongA
IsWindowEnabled
SetWindowPos
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
InvalidateRect
SendMessageA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
DefWindowProcA
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SetBkColor
SelectObject
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
ShellExecuteA
SHBrowseForFolderA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
SHGetPathFromIDListA
OleUninitialize
OleInitialize
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalSize
GlobalFree
lstrcpyA
lstrcpynA
FreeLibrary
GetModuleHandleA
LoadLibraryA
GetProcAddress
lstrcatA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
InternetReadFile
InternetCloseHandle
InternetConnectA
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
GetCurrentProcess
GetProcAddress
GetModuleHandleA
CloseHandle
WaitForSingleObject
CreateMutexA
CreateEventA
LocalAlloc
LocalFree
lstrcatA
lstrcpyA
GlobalFree
RtlUnwind
GetModuleFileNameA
SetEvent
lstrcmpA
MultiByteToWideChar
lstrlenA
IsDBCSLeadByte
IsDebuggerPresent
CreateProcessA
ReleaseMutex
FreeLibrary
Sleep
LoadLibraryA
SetCurrentDirectoryA
lstrcmpiA
GetCurrentDirectoryA
GetVersionExA
VirtualQuery
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GlobalAlloc
WideCharToMultiByte
MessageBoxA
wsprintfA
FreeSid
SetSecurityDescriptorDacl
RegCreateKeyExA
AllocateAndInitializeSid
RegCloseKey
RegQueryValueExA
InitializeSecurityDescriptor
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
A0DB34FC6FE35D429A28ADDE5467D4D7
Hlp1
Hlp2
Hlp3
Hlp4
Hlp5
Hlp6
Hlp7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\SPTDinst.pdb
RegCreateKeyExA
OpenServiceA
RegQueryValueExA
RegOpenKeyA
CloseServiceHandle
CreateServiceA
RegOpenKeyExA
InitializeSecurityDescriptor
OpenSCManagerA
RegCloseKey
RegGetKeySecurity
FreeSid
RegSetKeySecurity
RegDeleteValueA
SetSecurityDescriptorDacl
RegSetValueExA
AllocateAndInitializeSid
HeapFree
HeapReAlloc
LocalAlloc
WaitForSingleObject
ReleaseMutex
CreateMutexA
CloseHandle
LocalFree
GetTickCount
GetLastError
GetProcAddress
CreateThread
VirtualFree
GetProcessHeap
VirtualAlloc
HeapAlloc
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
GetStartupInfoW
GetCurrentProcess
LoadLibraryA
GetModuleHandleA
GetCommandLineA
Sleep
UnhandledExceptionFilter
EndDialog
GetDlgItem
DialogBoxParamA
MessageBoxA
SendMessageA
EnableWindow
SendDlgItemMessageA
__getmainargs
_unlink
_XcptFilter
_exit
_ismbblead
_cexit
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
_commode
_fmode
__set_app_type
memset
?terminate@@YAXXZ
_fsopen
memmove
srand
fwrite
rand
fclose
sprintf
_mbsicmp
_mbsnbicmp
__C_specific_handler
CertOpenStore
CertSetCertificateContextProperty
CertFreeCertificateContext
CertAddEncodedCertificateToStore
CertCloseStore
A0DB34FC6FE35D429A28ADDE5467D4D7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ