Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
AmazonSetup.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
AmazonSetup.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
AmazonGamesSetup.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
AmazonGamesSetup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
LIXVoWXPPCyc5Jy.exe
Resource
win7-20240508-en
Target
248950cf7a2d01e99e1e815c7dc5b28c_JaffaCakes118
Size
2.8MB
MD5
248950cf7a2d01e99e1e815c7dc5b28c
SHA1
1a7769c3996c2910fa22bd33f3a346e92b3c336b
SHA256
18f501c16c958abd19fafa10b1fb5baac2387a51807eb9229fa1cbe4a663b9b6
SHA512
140d73e524d0972f5a48dab8a970c2ce47e13f3182325b733d411a4f680f5cc8486ae6a5c24808c445e2d8828409eceebbefc3a4e5e58f336c2e3218a438bfa8
SSDEEP
49152:ESeo65Ct0m42NzeP/HIvWV2hyVZelukZCWaOtBVxRQL73qPvqQ39dqp6b7t:qe0sK/6RqZeJAWaOj/RuUCQgAN
Checks for missing Authenticode signature.
Processes:
resource |
---|
unpack001/AmazonSetup.exe |
unpack002/LIXVoWXPPCyc5Jy.exe |
Processes:
resource | yara_rule |
---|---|
static1/unpack001/AmazonSetup.exe | nsis_installer_1 |
static1/unpack001/AmazonSetup.exe | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetFileAttributesA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CompareFileTime
SearchPathA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
CreateDirectoryA
lstrcmpiA
GetCommandLineA
GetVersion
SetErrorMode
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
LoadLibraryA
SetFileTime
CloseHandle
GlobalFree
lstrcmpA
ExpandEnvironmentStringsA
GetExitCodeProcess
GlobalAlloc
WaitForSingleObject
GetWindowsDirectoryA
GetTempPathA
GetProcAddress
FindFirstFileA
FindNextFileA
DeleteFileA
SetFilePointer
ReadFile
FindClose
GetPrivateProfileStringA
WritePrivateProfileStringA
WriteFile
MulDiv
LoadLibraryExA
GetModuleHandleA
MultiByteToWideChar
FreeLibrary
GetWindowRect
EnableMenuItem
GetSystemMenu
ScreenToClient
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetForegroundWindow
PostQuitMessage
RegisterClassA
EndDialog
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
ExitWindowsEx
DestroyWindow
OpenClipboard
TrackPopupMenu
SendMessageTimeoutA
GetDC
LoadImageA
GetDlgItem
FindWindowExA
IsWindow
SetClipboardData
SetWindowLongA
EmptyClipboard
SetTimer
CreateDialogParamA
wsprintfA
ShowWindow
SetWindowTextA
SelectObject
SetBkMode
CreateFontIndirectA
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
RegDeleteValueA
SetFileSecurityA
RegOpenKeyExA
RegDeleteKeyA
RegEnumValueA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
ImageList_Create
ImageList_Destroy
ord17
ImageList_AddMasked
OleUninitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\BuildAgent\work\2d8069f083912ec0\installer\bin\Win32\Release\Amazon Games Setup.pdb
GetCurrentThread
SetFilePointerEx
MoveFileExW
CreateMutexA
GetExitCodeThread
SystemTimeToFileTime
SetFileAttributesW
LoadLibraryExA
FreeLibrary
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetLastError
GetThreadTimes
OutputDebugStringW
GetDynamicTimeZoneInformation
QueryPerformanceCounter
GetDiskFreeSpaceExA
SetThreadPriority
WideCharToMultiByte
GlobalMemoryStatusEx
GetProcessHeap
GetCurrentProcessId
DeleteCriticalSection
HeapDestroy
DecodePointer
GetOverlappedResult
GetCurrentDirectoryW
HeapAlloc
CreateThread
RaiseException
HeapReAlloc
Process32FirstW
QueryPerformanceFrequency
LoadLibraryA
GetDiskFreeSpaceExW
Process32NextW
FormatMessageW
MultiByteToWideChar
CreateEventW
CreateToolhelp32Snapshot
HeapSize
OpenProcess
GetModuleHandleA
ReleaseMutex
GetVersionExW
GetLocaleInfoW
InitializeCriticalSectionEx
CreateMutexW
GetTempPathW
SetFilePointer
GetUserDefaultUILanguage
GetModuleFileNameW
RemoveDirectoryW
TerminateProcess
GetSystemDefaultUILanguage
GetStdHandle
HeapFree
GetFileSizeEx
ReadFile
CreateDirectoryW
GetExitCodeProcess
GetModuleHandleW
CreateProcessW
GetProcAddress
GetWindowsDirectoryW
LoadLibraryW
CloseHandle
DeleteFileW
GetLastError
Sleep
GetCurrentThreadId
CreateFileW
WaitForSingleObject
WriteFile
GetCurrentProcess
GetSystemTime
SetEndOfFile
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
ReadConsoleW
GetTimeZoneInformation
FlushFileBuffers
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
GetCommandLineW
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetACP
ExitProcess
ExitThread
SetStdHandle
FileTimeToSystemTime
EncodePointer
IsProcessorFeaturePresent
QueueUserWorkItem
GetModuleHandleExW
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
AreFileApisANSI
GetStringTypeW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
CompareStringW
LCMapStringW
GetCPInfo
SetEvent
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
CreateTimerQueue
FreeLibraryAndExitThread
LoadLibraryExW
SignalObjectAndWait
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RtlUnwind
GetFileType
GetModuleFileNameA
WriteConsoleW
GetSystemInfo
VirtualQuery
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
IsIconic
GetWindowTextW
GetWindowThreadProcessId
GetWindowRect
MessageBoxW
FindWindowW
EnumWindows
EndPaint
BeginPaint
GetCursorPos
ReleaseDC
InvalidateRect
ReleaseCapture
UpdateWindow
ShowWindow
PostQuitMessage
DrawIconEx
DrawTextW
UpdateLayeredWindow
SetCapture
LoadCursorW
TranslateMessage
TrackMouseEvent
PeekMessageW
SetTimer
DispatchMessageW
RegisterClassExW
GetSystemMetrics
GetIconInfo
CreateWindowExW
SetWindowPos
GetDC
DefWindowProcW
SystemParametersInfoW
SetForegroundWindow
PostMessageW
GetSaveFileNameW
GetSecurityDescriptorDacl
GetSecurityDescriptorOwner
GetFileSecurityW
DuplicateToken
MapGenericMask
GetTokenInformation
RegQueryValueExW
LookupAccountSidW
GetUserNameW
GetLengthSid
RegOpenKeyExW
CheckTokenMembership
FreeSid
OpenProcessToken
IsValidSid
RegCreateKeyExW
RegSetValueExW
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
EqualSid
GetSidSubAuthorityCount
AllocateAndInitializeSid
GetSidSubAuthority
GetSidLengthRequired
CopySid
InitializeSid
AccessCheck
ShellExecuteExW
SHParseDisplayName
ShellExecuteA
SHGetFolderPathW
SHCreateShellItem
CommandLineToArgvW
CoCreateGuid
StringFromCLSID
CoInitializeEx
CoTaskMemFree
CoUninitialize
CoCreateInstance
WinHttpConnect
WinHttpSetTimeouts
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpReadData
WinHttpQueryHeaders
WinHttpAddRequestHeaders
WinHttpOpen
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
SHStrDupW
UnloadUserProfile
UuidCreate
AlphaBlend
GetTextExtentPoint32W
DeleteDC
SetBkMode
CreatePen
Rectangle
SetTextColor
TextOutW
CreateFontW
GdiFlush
StretchBlt
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
BitBlt
GetObjectW
SetStretchBltMode
DeleteObject
CreateSolidBrush
CreateDIBitmap
RoundRect
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_CorExeMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ