Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
7146b0789e7e384b97b9d0c97cfc201a_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7146b0789e7e384b97b9d0c97cfc201a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
7146b0789e7e384b97b9d0c97cfc201a_JaffaCakes118
Size
2.2MB
MD5
7146b0789e7e384b97b9d0c97cfc201a
SHA1
4f7c5c83217a081eb4721bf677fb68071f116c9b
SHA256
fb17dadcfb0773d59a546b61f73c4861917f8ae93c0590535f304b0a4e0e6ecd
SHA512
f3f82a4d4dd9639edc7bdee45c5eebd06f8e517045a394c374741d038fd45b87ddaac8736048939a482d166eb061aae6393101c8358cd0f32aead335211f0c90
SSDEEP
49152:J2OOenGxGipXs22a/tgrYJUGfZC3wA6EylfwEaFWM:ZOenWhXvttLxC3sEwwMM
resource | yara_rule |
---|---|
sample | nsis_installer_2 |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\codes\VS2010\SogouSoftware\trunk\Src\MiniDownLoad\Release\MiniDownLoad.pdb
CloseHandle
DebugBreak
GetCommandLineW
GetTempPathW
CompareStringW
GetProcessHeap
SetEndOfFile
WriteConsoleW
SetStdHandle
SetFilePointer
LockResource
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameW
GetTimeZoneInformation
FlushFileBuffers
GetConsoleMode
GetConsoleCP
FindFirstFileExW
GetDriveTypeW
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateThread
ExitThread
lstrlenW
MultiByteToWideChar
CreateFileW
SizeofResource
WriteFile
GetModuleHandleW
OutputDebugStringW
InterlockedDecrement
InterlockedIncrement
LoadResource
FindResourceW
lstrlenA
GetCurrentDirectoryW
FreeResource
CreateFileA
CreateMutexW
lstrcmpW
GetSystemDirectoryW
DeviceIoControl
ReadFile
CopyFileW
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapFree
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetProcAddress
LCMapStringW
GetStringTypeW
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
HeapSize
Sleep
RtlUnwind
WideCharToMultiByte
GetUserDefaultLCID
GetLocaleInfoW
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
FreeLibrary
InterlockedExchange
LoadLibraryW
GetEnvironmentVariableW
CreateDirectoryW
GetPrivateProfileStringW
WaitForSingleObject
OutputDebugStringA
InitializeCriticalSection
FindFirstFileW
FindNextFileW
FindClose
GetVersionExW
GetLocalTime
CreateEventW
CreateSemaphoreW
ResetEvent
ReleaseSemaphore
SetEvent
WaitForMultipleObjects
DeleteFileW
lstrcpynW
lstrcpyW
GetFileSize
SetEnvironmentVariableA
wvsprintfW
wsprintfW
CharNextW
LoadStringW
ShellExecuteExW
ShellExecuteW
SHGetSpecialFolderPathW
SHFileOperationW
CoInitialize
CoGetClassObject
CoCreateGuid
CoUninitialize
StrCpyW
PathIsDirectoryW
PathFileExistsW
SHSetValueW
SHGetValueW
PathAppendW
GetModuleBaseNameW
InternetConnectW
InternetCloseHandle
InternetOpenW
InternetSetOptionW
InternetQueryDataAvailable
HttpQueryInfoW
InternetCrackUrlW
HttpSendRequestW
HttpOpenRequestW
InternetReadFile
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
NetApiBufferFree
NetWkstaTransportEnum
Netbios
RegOpenKeyExA
RegCloseKey
OpenSCManagerW
OpenServiceW
QueryServiceStatus
CloseServiceHandle
RegQueryValueExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ