Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Overview
overview
6Static
static
3INSTALL.bat
windows7-x64
1INSTALL.bat
windows10-2004-x64
1UIXXCOPY.bat
windows7-x64
1UIXXCOPY.bat
windows10-2004-x64
1XXCONSOLE.exe
windows7-x64
6XXCONSOLE.exe
windows10-2004-x64
6XXCOPY.chm
windows7-x64
1XXCOPY.chm
windows10-2004-x64
1XXCOPY.exe
windows7-x64
1XXCOPY.exe
windows10-2004-x64
1XXCOPY16.exe
windows7-x64
XXCOPY16.exe
windows10-2004-x64
XXCOPYSU.exe
windows7-x64
1XXCOPYSU.exe
windows10-2004-x64
1XXPBAR.exe
windows7-x64
1XXPBAR.exe
windows10-2004-x64
1新云软件.url
windows7-x64
1新云软件.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
INSTALL.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
INSTALL.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
UIXXCOPY.bat
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
UIXXCOPY.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
XXCONSOLE.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
XXCONSOLE.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
XXCOPY.chm
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
XXCOPY.chm
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
XXCOPY.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
XXCOPY.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
XXCOPY16.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
XXCOPY16.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
XXCOPYSU.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
XXCOPYSU.exe
Resource
win10v2004-20240708-en
Behavioral task
behavioral15
Sample
XXPBAR.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
XXPBAR.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
新云软件.url
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
新云软件.url
Resource
win10v2004-20240704-en
Target
2cb1d5b82cc6955ff88ecdaaf7011089_JaffaCakes118
Size
921KB
MD5
2cb1d5b82cc6955ff88ecdaaf7011089
SHA1
c014e7d87e4b70683b61bfa32526588ba47f4b2c
SHA256
012668097f9785adf9e35e6415151a885e2f8a5e9221ab549fd31a2517f73913
SHA512
cb9d99be9dbe045f8a6a91348487f8dd66761cda13c80feddab1705212231ced3022c9e1b7646d4cfec8285365c7890cd1fc20051ce0642873369b2488defc8f
SSDEEP
24576:lL6bVBBb/ULTE70vz+e/aut/7OrfRt/obGdUk120VW4PRmlzc:lUBpcvlrrSuVApNZxVW4PElc
Checks for missing Authenticode signature.
resource |
---|
unpack001/XXPBAR.EXE |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\dev\xxcons\xxcons\Release\xxcons.pdb
GetVersionExA
HeapSize
SetEndOfFile
lstrcmpiW
GetLocaleInfoA
GetStringTypeW
FindNextFileA
FindClose
GetTempFileNameA
FindFirstFileA
lstrlenW
MultiByteToWideChar
GetEnvironmentVariableA
GetFileAttributesA
GetCommandLineA
GetWindowsDirectoryA
MoveFileExA
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
GetFullPathNameA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
RtlUnwind
GetLastError
ReadFile
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
CloseHandle
GetProcAddress
GetModuleHandleA
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
Sleep
InitializeCriticalSection
CreateFileA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
VirtualAlloc
HeapReAlloc
DeleteFileA
DialogBoxParamA
EnableWindow
IsDlgButtonChecked
GetDlgItemInt
GetWindowRect
LoadIconA
MessageBeep
SendMessageA
SetDlgItemInt
MessageBoxA
GetDlgItem
EndDialog
SetWindowPos
CheckDlgButton
RegDeleteKeyA
RegSetValueExW
RegCloseKey
RegOpenKeyA
RegCreateKeyA
RegCreateKeyW
RegOpenKeyW
RegQueryValueExW
RegQueryValueExA
RegSetValueExA
CoUninitialize
CoInitialize
CoCreateInstance
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\dev\xx2966c\xxcopy\FWrel\xfcopy.pdb
GetProcAddress
GetConsoleScreenBufferInfo
GetModuleHandleA
GetVersionExA
GetFullPathNameA
CreateFileA
MapViewOfFile
UnmapViewOfFile
GetCurrentProcess
WaitForSingleObject
SetFileTime
WriteFile
GetCommandLineA
GetDriveTypeA
GetVolumeInformationA
CreateProcessA
TerminateProcess
ReadFile
CreateDirectoryA
GetStartupInfoA
FindFirstFileA
GetLastError
RemoveDirectoryA
CopyFileA
SetFileAttributesA
GetTempFileNameA
FindClose
CreateFileMappingA
MoveFileA
FindNextFileA
CreateMutexA
GetStdHandle
CloseHandle
FileTimeToLocalFileTime
LocalFree
GetSystemTime
DeleteFileA
LocalFileTimeToFileTime
GetComputerNameA
FileTimeToDosDateTime
DosDateTimeToFileTime
GetFileSize
GetTimeFormatA
GetNumberFormatA
GetConsoleTitleA
GetDateFormatA
Beep
GetSystemDirectoryA
MultiByteToWideChar
SetConsoleTitleA
GetLocalTime
SetConsoleCtrlHandler
GetDiskFreeSpaceA
DeviceIoControl
GetCurrentProcessId
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
GetACP
GetEnvironmentVariableA
FileTimeToSystemTime
GetFileAttributesA
Sleep
GetWindowsDirectoryA
GetTickCount
SystemTimeToFileTime
GetSystemDefaultLCID
CompareFileTime
ReleaseMutex
WriteConsoleA
HeapSize
SetStdHandle
HeapFree
HeapAlloc
ExitProcess
EnterCriticalSection
LeaveCriticalSection
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetProcessHeap
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
RtlUnwind
SetHandleCount
GetFileType
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetOEMCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
WideCharToMultiByte
LCMapStringW
LoadLibraryA
InitializeCriticalSection
GetConsoleCP
FlushFileBuffers
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetFilePointer
GetExitCodeProcess
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FindWindowA
GetWindowLongA
MessageBoxA
GetWindowThreadProcessId
ShowWindow
RegCreateKeyA
RegEnumValueA
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyA
RegEnumKeyExA
RegDeleteKeyA
CoCreateInstance
CoUninitialize
CoInitialize
WNetGetUniversalNameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\dev\xx2966c\xxcopy\FWrel\xfcopy.pdb
GetProcAddress
GetConsoleScreenBufferInfo
GetModuleHandleA
GetVersionExA
GetFullPathNameA
CreateFileA
MapViewOfFile
UnmapViewOfFile
GetCurrentProcess
WaitForSingleObject
SetFileTime
WriteFile
GetCommandLineA
GetDriveTypeA
GetVolumeInformationA
CreateProcessA
TerminateProcess
ReadFile
CreateDirectoryA
GetStartupInfoA
FindFirstFileA
GetLastError
RemoveDirectoryA
CopyFileA
SetFileAttributesA
GetTempFileNameA
FindClose
CreateFileMappingA
MoveFileA
FindNextFileA
CreateMutexA
GetStdHandle
CloseHandle
FileTimeToLocalFileTime
LocalFree
GetSystemTime
DeleteFileA
LocalFileTimeToFileTime
GetComputerNameA
FileTimeToDosDateTime
DosDateTimeToFileTime
GetFileSize
GetTimeFormatA
GetNumberFormatA
GetConsoleTitleA
GetDateFormatA
Beep
GetSystemDirectoryA
MultiByteToWideChar
SetConsoleTitleA
GetLocalTime
SetConsoleCtrlHandler
GetDiskFreeSpaceA
DeviceIoControl
GetCurrentProcessId
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
GetACP
GetEnvironmentVariableA
FileTimeToSystemTime
GetFileAttributesA
Sleep
GetWindowsDirectoryA
GetTickCount
SystemTimeToFileTime
GetSystemDefaultLCID
CompareFileTime
ReleaseMutex
WriteConsoleA
HeapSize
SetStdHandle
HeapFree
HeapAlloc
ExitProcess
EnterCriticalSection
LeaveCriticalSection
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetProcessHeap
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
RtlUnwind
SetHandleCount
GetFileType
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetOEMCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
WideCharToMultiByte
LCMapStringW
LoadLibraryA
InitializeCriticalSection
GetConsoleCP
FlushFileBuffers
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetFilePointer
GetExitCodeProcess
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FindWindowA
GetWindowLongA
MessageBoxA
GetWindowThreadProcessId
ShowWindow
RegCreateKeyA
RegEnumValueA
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyA
RegEnumKeyExA
RegDeleteKeyA
CoCreateInstance
CoUninitialize
CoInitialize
WNetGetUniversalNameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
UnmapViewOfFile
OpenMutexA
CloseHandle
MapViewOfFile
CreateFileMappingA
GetSystemInfo
VirtualProtect
GetLocaleInfoA
RtlUnwind
GetStringTypeW
WaitForSingleObject
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
HeapSize
HeapReAlloc
VirtualAlloc
GetCommandLineA
ReleaseMutex
GetStringTypeA
lstrlenA
GetModuleHandleA
GetStartupInfoA
GetVersionExA
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualQuery
GetForegroundWindow
GetDesktopWindow
DialogBoxParamA
GetDlgItem
LoadIconA
SendMessageA
EnableWindow
SetForegroundWindow
SetTimer
MessageBoxA
ShowWindow
KillTimer
EndDialog
SetWindowPos
IsIconic
GetWindowRect
wsprintfA
CreateFontA
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ