Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Behavioral task
behavioral1
Sample
dm.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
dm.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
dmsp.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
dmsp.dll
Resource
win10v2004-20240226-en
Target
079f63cc4a253b667c576e21f6478ffd_JaffaCakes118
Size
314KB
MD5
079f63cc4a253b667c576e21f6478ffd
SHA1
d821940c1766e5f2eca74d1193f5ea07dbcff7d4
SHA256
f29c107673cb7170c09d89d1548d555ac032a025e9268fb7d93ecd907b3f3a32
SHA512
23f524a4fbe4254707af867841c528fcbe6e7a6c6c67cc86ac2bdca28e3b90818690a5343114f4dedaf3bf8825f829b2ec580b477a45fe43e9783074c6367deb
SSDEEP
6144:NEmxXEYWfib0MXLTg7O4uoB/4FwuwV0LZT6ZH1MKKc1XGzYqR:WGXEYWfib0UPgaw4FwVQd6ZHktzYqR
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/dmsp.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/dmsp.dll | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack002/out.upx |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
d:\CSDN\Source\DualMatch\Release\dm.pdb
LocalAlloc
TlsGetValue
GlobalReAlloc
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
VirtualProtect
VirtualAlloc
GetSystemInfo
RtlUnwind
ExitThread
CreateThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
SetStdHandle
GetFileType
HeapReAlloc
ExitProcess
HeapSize
GetACP
IsValidCodePage
ConvertDefaultLocale
VirtualFree
HeapCreate
HeapDestroy
GetStdHandle
LCMapStringW
CompareStringW
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetFileSize
IsProcessorFeaturePresent
InterlockedCompareExchange
SetEndOfFile
UnlockFile
LCMapStringA
GetCurrentThread
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetFileTime
GetFileSizeEx
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetVersionExA
FreeResource
GetModuleFileNameW
TerminateProcess
FindFirstFileA
FindClose
IsWow64Process
GetVersion
VirtualQuery
GetCurrentProcessId
SetErrorMode
GetProcessHeap
HeapAlloc
HeapFree
FormatMessageA
LocalFree
CreateFileA
WriteFile
GetLocalTime
GetCommandLineA
GlobalHandle
GlobalFree
Sleep
WaitForSingleObject
TerminateThread
CreateEventA
SetEvent
CloseHandle
GetTickCount
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
lstrcmpA
GetCurrentProcess
FlushInstructionCache
SetLastError
InterlockedIncrement
InterlockedDecrement
LockResource
DeleteCriticalSection
InitializeCriticalSection
GetThreadLocale
SetThreadLocale
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
IsDBCSLeadByte
GetModuleHandleW
GetModuleFileNameA
LoadLibraryA
FreeLibrary
lstrcmpiA
lstrlenA
GetModuleHandleA
GetProcAddress
GetLastError
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
IsRectEmpty
CopyAcceleratorTableA
DestroyMenu
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetSysColorBrush
UnregisterClassA
SetCursor
GetMessageA
GetCursorPos
ValidateRect
PostQuitMessage
CharUpperA
ShowWindow
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadIconA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetLastActivePopup
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetRect
GetKeyState
SetMenu
IsWindowVisible
UpdateWindow
PostMessageA
MessageBoxA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetActiveWindow
SetActiveWindow
IsWindowEnabled
CharNextA
CharNextW
SetTimer
IsWindow
GetNextDlgTabItem
EndDialog
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wvsprintfA
PeekMessageA
DispatchMessageA
TranslateMessage
GetForegroundWindow
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
KillTimer
EnableWindow
SendDlgItemMessageA
FlashWindow
MapDialogRect
DestroyWindow
SetWindowLongA
GetWindowLongA
CreateWindowExA
SetWindowPos
GetWindow
SetWindowContextHelpId
SendMessageA
DefWindowProcA
GetSysColor
MoveWindow
GetClientRect
ClientToScreen
ScreenToClient
GetDC
ReleaseDC
InvalidateRect
InvalidateRgn
RedrawWindow
SetCapture
IsChild
GetParent
GetDlgItem
GetClassNameA
ReleaseCapture
FillRect
CallWindowProcA
EndPaint
BeginPaint
DestroyAcceleratorTable
GetFocus
SetFocus
GetDesktopWindow
GetClassInfoExA
LoadCursorA
RegisterClassExA
CreateAcceleratorTableA
SendMessageTimeoutA
EnumChildWindows
FindWindowA
FindWindowExA
SetForegroundWindow
GetSystemMetrics
GetWindowRect
GetWindowThreadProcessId
CreateDialogIndirectParamA
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
SetMapMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetStockObject
GetObjectA
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
DeleteObject
DeleteDC
SelectObject
SetViewportOrgEx
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
RegQueryValueA
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
RegEnumKeyA
RegOpenKeyA
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
SHGetSpecialFolderPathA
SHGetFolderPathA
PathRemoveFileSpecA
PathIsURLA
StrToIntA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
PathAddBackslashA
PathFindExtensionA
ord8
OleUninitialize
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateStreamOnHGlobal
CoFreeUnusedLibraries
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
OleLockRunning
OleInitialize
CoCreateInstance
StringFromGUID2
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
CreateILockBytesOnHGlobal
CoGetClassObject
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
SysAllocStringByteLen
VariantClear
SysAllocStringLen
LoadRegTypeLi
VariantInit
OleCreateFontIndirect
VariantChangeType
SysAllocString
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
SysFreeString
SysStringLen
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
Netbios
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Setting
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ