Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Behavioral task
behavioral1
Sample
396aca7961e82c7f03268ae34105a0ba_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
396aca7961e82c7f03268ae34105a0ba_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$TEMP/RunVG.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$TEMP/RunVG.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$TEMP/setup-vghd_2cck1UPxtsEZ00N.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$TEMP/setup-vghd_2cck1UPxtsEZ00N.exe
Resource
win10v2004-20240709-en
Target
396aca7961e82c7f03268ae34105a0ba_JaffaCakes118
Size
6.1MB
MD5
396aca7961e82c7f03268ae34105a0ba
SHA1
4ddbf7b8b90752fbf1c743657212128c889c53c1
SHA256
98587c056f2e5afd15786df08cf805846960276a576d3e0b245b5efe853036cd
SHA512
05d1898c5994d31ae5300a8e4202d4138e305348f1e025d11043e651544900e0cd0816432661de34a3d5c1c65936ea76a8e4fd88622a39ccb88ce92d4b4a954e
SSDEEP
98304:lXq6PYRe8YFkUvoJdrAOn6khv9BB4VbG3Zpy8FnOtWwBbU8yrdnmvzg7fsj1Z:l66P6ex/JO7DB08phOU8yrwvsIj1Z
resource | yara_rule |
---|---|
static1/unpack001/$TEMP/RunVG.exe | upx |
AutoIT scripts compiled to PE executables.
resource | yara_rule |
---|---|
static1/unpack002/out.upx | autoit_exe |
Checks for missing Authenticode signature.
resource |
---|
396aca7961e82c7f03268ae34105a0ba_JaffaCakes118 |
unpack001/$TEMP/RunVG.exe |
unpack002/out.upx |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
sample | nsis_installer_2 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHSetValueA
SHDeleteValueA
SHGetValueA
ord17
LZClose
LZRead
LZOpenFileA
GetVolumeInformationA
GetWindowsDirectoryA
Sleep
GetCommandLineA
GlobalReAlloc
GlobalUnlock
GlobalLock
GlobalAlloc
GetStringTypeA
HeapSize
SetEndOfFile
GetCPInfo
GetOEMCP
GetACP
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
FlushFileBuffers
SetStdHandle
CreateFileA
LoadLibraryA
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetShortPathNameA
ReadFile
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
WriteFile
CloseHandle
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetCurrentProcess
TerminateProcess
GetProcAddress
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetVersionExA
GetStartupInfoA
GetModuleHandleA
RtlUnwind
HeapFree
HeapAlloc
DeleteFileA
MultiByteToWideChar
CreateProcessA
VirtualQuery
WinExec
GetTempPathA
GetLastError
CreateDirectoryA
GetStringTypeW
LCMapStringA
LCMapStringW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
UnhandledExceptionFilter
ExitProcess
RegisterClassExA
CreateWindowExA
EnableWindow
EndDialog
SetRect
DialogBoxParamA
SetPropA
GetPropA
SetWindowLongA
IsDlgButtonChecked
MoveWindow
SetWindowTextA
SetWindowRgn
CheckDlgButton
SetFocus
EnumDisplaySettingsA
InvalidateRect
ShowWindow
LoadCursorA
SetTimer
SetDlgItemTextA
SetWindowPos
GetCapture
ReleaseCapture
GetClientRect
PtInRect
SetCapture
PostQuitMessage
DestroyWindow
KillTimer
LoadStringA
LoadBitmapA
SendMessageA
GetAsyncKeyState
GetWindowRect
GetCursorPos
GetDlgItem
EnumWindows
MessageBoxA
LoadImageA
GetWindowTextA
PostMessageA
GetClassInfoExA
ReleaseDC
GetDC
RedrawWindow
CreateDIBSection
GetObjectA
CreateCompatibleDC
CreateSolidBrush
BitBlt
ExtCreateRegion
CombineRgn
DeleteDC
SelectObject
SetBkColor
SetTextColor
SetBkMode
CreateFontA
DeleteObject
SHGetPathFromIDListA
SHGetFolderPathA
SHBrowseForFolderA
CoCreateInstance
CoInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ