Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
047d8b6275e0f20adf2d8b7e6b52e777_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
047d8b6275e0f20adf2d8b7e6b52e777_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
047d8b6275e0f20adf2d8b7e6b52e777_JaffaCakes118
Size
1.8MB
MD5
047d8b6275e0f20adf2d8b7e6b52e777
SHA1
85ba9b93ca00a505c644b5206425950f36228100
SHA256
08cbb136bcbe1e597849149d696b15a81f37b91835b58e26a614677b498a47c4
SHA512
3e3cd1f3e299e82d247aa2ea95cf21fc244624a44cd5e81702adaef89ff2ff115dcdd06fb194f98f65546c567af70fb5512ca326d39303d4aa1dcf8e939f1e6a
SSDEEP
49152:gd8aIXIRo76WEjfS8ARikJji3B29TF2/a/2AuXnbLD:gd89XI+IjBH93BSw/MybX
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GlobalLock
GlobalAlloc
CloseHandle
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
GlobalUnlock
GetWindowsDirectoryA
GetTempPathA
GetCommandLineA
SetErrorMode
lstrcpyA
lstrcpynA
lstrcatA
LoadLibraryA
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
GetDiskFreeSpaceA
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
GetSystemDirectoryA
GetVersion
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MulDiv
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GlobalSize
ExitProcess
SetClassLongA
IsWindowEnabled
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetSystemMenu
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
RegisterClassA
DialogBoxParamA
CharNextA
ExitWindowsEx
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
EnableMenuItem
GetWindowRect
ScreenToClient
SetWindowPos
EndDialog
AppendMenuA
GetClassInfoA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
GetClientRect
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
SendMessageTimeoutA
SetBkMode
SetBkColor
CreateBrushIndirect
DeleteObject
GetDeviceCaps
SetTextColor
CreateFontIndirectA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegCloseKey
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CLSIDFromString
OleInitialize
OleUninitialize
CoTaskMemFree
StringFromGUID2
CoCreateInstance
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ