Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Behavioral task
behavioral1
Sample
Chess Blitz.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Chess Blitz.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
nardy-online.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
nardy-online.exe
Resource
win10v2004-20240709-en
Target
6a8cef53e4f857e936405839cc1bbdfe_JaffaCakes118
Size
1.4MB
MD5
6a8cef53e4f857e936405839cc1bbdfe
SHA1
c509b988582fa6f5e857dde06a8759717c080ec6
SHA256
3cc07bdafdec73ca012136eb9d4764531ad0b266f9c7a702afdc19c27a81cd16
SHA512
ea933d787dad1ca5f2509017f2b13446fe4e5de209d149935077b4f8d8f54a3229fe747417b3dc6f4f7bb40f48f187a853df9ae71d1a254c7edd2001157b64af
SSDEEP
24576:D1O2Kd3hq0TagSHjWgiwQr7u8l5XjNxidrRVF+Ru6hOnFDaF5v/u6:D1O2KdVTEHq1ri8/jNxiNqEk5vm6
resource | yara_rule |
---|---|
static1/unpack001/Chess Blitz.exe | aspack_v212_v242 |
Checks for missing Authenticode signature.
resource |
---|
unpack001/Chess Blitz.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WideCharToMultiByte
GetLastError
lstrcmpiA
lstrlenW
lstrlenA
GetStringTypeW
GetStringTypeA
GetCPInfo
CloseHandle
CompareStringA
CompareStringW
WriteFile
CreateFileA
CreateDirectoryA
DeleteFileA
CopyFileA
TerminateProcess
OpenProcess
GetOEMCP
GetModuleFileNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetTempPathA
SetLastError
GetFileAttributesA
IsBadCodePtr
IsBadReadPtr
FlushFileBuffers
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
LCMapStringW
LCMapStringA
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
QueryPerformanceCounter
IsBadWritePtr
SetStdHandle
VirtualFree
HeapCreate
SetFilePointer
ExitThread
GetCurrentThreadId
MultiByteToWideChar
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetCommandLineA
LockResource
LoadResource
FindResourceA
GetStartupInfoA
RtlUnwind
FreeLibrary
LoadLibraryExA
Sleep
VirtualQuery
GetSystemInfo
SizeofResource
SetEndOfFile
MulDiv
SetEnvironmentVariableA
LocalFree
VirtualAlloc
GlobalFree
GlobalUnlock
GlobalLock
FreeResource
GlobalAlloc
ReadFile
GetFileSize
InterlockedIncrement
InterlockedDecrement
GetModuleHandleA
VirtualProtect
lstrcpynA
HeapAlloc
GetProcessHeap
HeapFree
GetCurrentProcess
FlushInstructionCache
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
IsDBCSLeadByte
MoveFileExA
GetCurrentProcessId
EnterCriticalSection
MoveFileA
ExitProcess
GetProcAddress
LoadLibraryA
Process32Next
Process32First
CreateToolhelp32Snapshot
FindClose
FindNextFileA
FindFirstFileA
HeapSize
CreateThread
HeapReAlloc
SetEvent
ResetEvent
WaitForMultipleObjects
CreateEventA
HeapDestroy
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
TlsAlloc
InterlockedExchange
IsWindowVisible
EnumWindows
GetWindowThreadProcessId
SetWindowTextA
CreateWindowExA
GetWindowLongA
PostMessageA
RegisterClassExA
DefWindowProcA
PostQuitMessage
UnregisterClassA
LoadCursorA
wsprintfA
GetClassInfoExA
MessageBoxA
ShowWindow
MoveWindow
SetWindowPos
InvalidateRect
GetDlgItemTextA
SetDlgItemTextA
GetDlgItem
GetClientRect
SetWindowLongA
SendMessageA
CharNextA
GetWindowDC
CreateIconFromResource
GetActiveWindow
DialogBoxParamA
SendDlgItemMessageA
CallWindowProcA
ClientToScreen
GetSysColor
FillRect
GetCursorPos
WindowFromPoint
GetCapture
ReleaseCapture
EndDialog
DestroyWindow
GetParent
GetWindow
GetWindowRect
SystemParametersInfoA
MapWindowPoints
SHFileOperationA
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
DeleteObject
GetMapMode
SetMapMode
LPtoDP
GetDeviceCaps
DPtoLP
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
CreateSolidBrush
DeleteDC
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyExA
RegQueryInfoKeyA
InternetSetOptionA
InternetQueryOptionA
InternetCloseHandle
HttpQueryInfoA
InternetConnectA
InternetOpenA
InternetReadFile
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
CoTaskMemAlloc
CoTaskMemRealloc
CreateStreamOnHGlobal
CoInitialize
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoCreateInstance
VariantInit
VariantClear
SysStringByteLen
SysAllocStringByteLen
VarUI4FromStr
OleLoadPicture
SysAllocStringLen
SysFreeString
_TrackMouseEvent
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ