Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
39a844b196a375165bed8d0f03495113_JaffaCakes118.exe
Resource
win7-20231129-en
Target
39a844b196a375165bed8d0f03495113_JaffaCakes118
Size
377KB
MD5
39a844b196a375165bed8d0f03495113
SHA1
283a81b3458e75c2f8214f24d1f0d1b31b6cfe78
SHA256
169b6c76c6a5a9c47fa04324103107dba5bc85037c54543642efffebac672301
SHA512
578e2edac0fc80da94de035c53c0515e3bdcf01dc6a0f314c105a5512a0e7aa0cbf09a3f3fdd025ca72226de24633f8d026d386fa0d395e8b5f2c34552e0f510
SSDEEP
6144:5NCaXZbW7wSWgxv716wHDCpun0SJFEPZYWWFbTj9hp+FNVBLX5HlS10:vCaXZbSpWgb6wuUpGxWV5sBJHlSm
resource | yara_rule |
---|---|
sample | vmprotect |
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WriteConsoleW
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
GetDC
StretchBlt
ConvertSidToStringSidW
SHParseDisplayName
CoUninitialize
VariantInit
inet_ntoa
WinHttpReadData
GdipDisposeImage
PathFindFileNameW
?eflmakfil@@YAPA_WPAK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ