Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Behavioral task
behavioral1
Sample
01b3f6b2bca082287830f076cc113fda_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
01b3f6b2bca082287830f076cc113fda_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
01b3f6b2bca082287830f076cc113fda_JaffaCakes118
Size
1.2MB
MD5
01b3f6b2bca082287830f076cc113fda
SHA1
b620d57802ee0cea72b13b23f1ea75bdc7633114
SHA256
78b884867857e7152788fa7ecbd3ded81b930b2e5fadebdd47ba0be356ec7e1e
SHA512
38465d58dde766ff2683ffe7a645adf4befcf2af7dbc2e6b9041f55a24cefacbbc5b0d10467d6b9e68c1066fc9e4caf6a0a91b6f4e64dc1ba7034bcd8088b326
SSDEEP
24576:P4JgqzfJ45qhAceTXipNyxD9PD8sOx/nZUC/dfNyGNS:P4aXipNo9QsoUwd1hc
resource | yara_rule |
---|---|
sample | family_egregor |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
b:\b\discord_desktop\build\x86_mt\DiscordHookHelper.exe.pdb
Thread32First
Thread32Next
CreateEventW
GetFileAttributesA
GetFileAttributesW
MoveFileExW
GetCurrentProcessId
ProcessIdToSessionId
OpenProcess
LocalFree
VirtualAlloc
VirtualFree
VirtualQuery
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
Sleep
GetCurrentThreadId
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualProtect
GetSystemInfo
GetNativeSystemInfo
VirtualQueryEx
ReadProcessMemory
IsWow64Process
GetSystemTimeAsFileTime
lstrcmpiW
QueryFullProcessImageNameW
Process32FirstW
Process32NextW
RtlCaptureStackBackTrace
WriteConsoleW
ReadConsoleW
ReadFile
HeapSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetProcessId
GetExitCodeThread
GetProcessTimes
SetLastError
OpenFileMappingA
LoadLibraryW
GetModuleHandleA
UnmapViewOfFile
MapViewOfFile
GetSystemDirectoryW
Module32NextW
Module32FirstW
CreateToolhelp32Snapshot
GetModuleHandleW
GetModuleFileNameW
GetCurrentProcess
WaitForSingleObject
GetLastError
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetTimeZoneInformation
SetFilePointerEx
GetFileSizeEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
CloseHandle
GetFinalPathNameByHandleW
GetProcAddress
CreateFileW
OutputDebugStringA
GetCommandLineW
VerifyVersionInfoW
VerSetConditionMask
GetModuleHandleExW
SetConsoleCtrlHandler
GetFileType
WriteFile
GetStdHandle
ExitProcess
ExitThread
RtlUnwind
RaiseException
QueryPerformanceCounter
QueryPerformanceFrequency
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetCurrentThread
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
CreateTimerQueue
SetEvent
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
LoadLibraryExW
GetVersionExW
SetProcessAffinityMask
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
WaitForMultipleObjectsEx
FormatMessageW
CreateWindowExA
UnhookWindowsHookEx
PostThreadMessageW
EnumThreadWindows
RegisterClassA
DefWindowProcA
IsWindowVisible
GetWindow
GetWindowThreadProcessId
EnumWindows
EnumChildWindows
GetWindowLongW
SetEntriesInAclW
AdjustTokenPrivileges
LookupPrivilegeValueW
GetTokenInformation
ConvertSidToStringSidA
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
SetSecurityInfo
SetNamedSecurityInfoW
GetSecurityInfo
GetNamedSecurityInfoW
OpenProcessToken
FreeSid
AllocateAndInitializeSid
RegGetValueW
CommandLineToArgvW
CoTaskMemFree
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
CoInitializeEx
VariantClear
PathRemoveFileSpecW
PathFindFileNameW
wnsprintfW
CryptMsgClose
CryptMsgGetParam
CertFindCertificateInStore
CertFreeCertificateContext
CryptHashPublicKeyInfo
CertGetNameStringW
CryptQueryObject
CertCloseStore
QueryWorkingSet
EnumProcesses
GetModuleInformation
EnumProcessModulesEx
GetModuleFileNameExW
WinVerifyTrust
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ