Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
a3e56a8489e07ff9cf88acc967541b3b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a3e56a8489e07ff9cf88acc967541b3b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/setuphlp.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/setuphlp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/"SPTDinst.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$TEMP/"SPTDinst.exe
Resource
win10v2004-20240802-en
Target
a3e56a8489e07ff9cf88acc967541b3b_JaffaCakes118
Size
8.8MB
MD5
a3e56a8489e07ff9cf88acc967541b3b
SHA1
a8befc4d31cb7d5fccfa7ae3de8b35bb6e3fc3c1
SHA256
54855243bc5cb65ec649f3bc8a0b0b92d0431d214776b850b49df71b27825d19
SHA512
e82927f6c1c451a7ec20bc2f3a2c1be0be62d18fe5c00d4aa93de83d62fff0ac9daf2cec8d08c1b7e2b31ef5ccd7897f1bfcdb8d8e1ae155017374492013ecd5
SSDEEP
196608:GPNgSuUnQ6Z0Om2x3V1pX5wVpjTIoCt3LNE6Y5Si2JkhNQ7vms:GBQ6R1ppwmu6EUOYms
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
ImageList_AddMasked
ImageList_Destroy
ImageList_Create
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetModuleHandleA
SetErrorMode
GetExitCodeProcess
WaitForSingleObject
ExpandEnvironmentStringsA
GetEnvironmentVariableA
lstrcmpiA
CloseHandle
SetFileTime
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
LoadLibraryA
ExitProcess
GetCurrentProcess
CopyFileA
lstrcpynA
GetCommandLineA
GetWindowsDirectoryA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
CreateProcessA
GetTempFileNameA
lstrcpyA
lstrlenA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetSystemDirectoryA
RemoveDirectoryA
GlobalFree
MulDiv
GetProcAddress
FreeLibrary
MultiByteToWideChar
DeleteFileA
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
SetWindowTextA
SetTimer
DestroyWindow
CreateDialogParamA
ExitWindowsEx
CharNextA
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
ScreenToClient
GetMessagePos
CallWindowProcA
IsWindowVisible
LoadBitmapA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuA
CreatePopupMenu
GetSystemMetrics
EndDialog
SetClassLongA
IsWindowEnabled
SetWindowPos
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
InvalidateRect
SendMessageA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
DefWindowProcA
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SetBkColor
SelectObject
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
ShellExecuteA
SHBrowseForFolderA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
SHGetPathFromIDListA
OleUninitialize
OleInitialize
CoCreateInstance
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
InternetReadFile
InternetCloseHandle
InternetConnectA
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
GetCurrentProcess
GetProcAddress
GetModuleHandleA
CloseHandle
WaitForSingleObject
CreateMutexA
CreateEventA
LocalAlloc
LocalFree
lstrcatA
lstrcpyA
GlobalFree
RtlUnwind
GetModuleFileNameA
SetEvent
lstrcmpA
MultiByteToWideChar
lstrlenA
IsDBCSLeadByte
IsDebuggerPresent
CreateProcessA
ReleaseMutex
FreeLibrary
Sleep
LoadLibraryA
SetCurrentDirectoryA
lstrcmpiA
GetCurrentDirectoryA
GetVersionExA
VirtualQuery
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GlobalAlloc
WideCharToMultiByte
MessageBoxA
wsprintfA
FreeSid
SetSecurityDescriptorDacl
RegCreateKeyExA
AllocateAndInitializeSid
RegCloseKey
RegQueryValueExA
InitializeSecurityDescriptor
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
A0DB34FC6FE35D429A28ADDE5467D4D7
Hlp1
Hlp2
Hlp3
Hlp4
Hlp5
Hlp6
Hlp7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\SPTDinst.pdb
RegCreateKeyExA
OpenServiceA
RegQueryValueExA
RegOpenKeyA
CloseServiceHandle
CreateServiceA
RegOpenKeyExA
InitializeSecurityDescriptor
OpenSCManagerA
RegCloseKey
RegGetKeySecurity
FreeSid
RegSetKeySecurity
RegDeleteValueA
SetSecurityDescriptorDacl
RegSetValueExA
AllocateAndInitializeSid
HeapFree
HeapReAlloc
LocalAlloc
WaitForSingleObject
ReleaseMutex
CreateMutexA
CloseHandle
LocalFree
GetTickCount
GetLastError
GetProcAddress
CreateThread
VirtualFree
GetProcessHeap
VirtualAlloc
HeapAlloc
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
GetStartupInfoW
GetCurrentProcess
LoadLibraryA
GetModuleHandleA
GetCommandLineA
Sleep
UnhandledExceptionFilter
EndDialog
GetDlgItem
DialogBoxParamA
MessageBoxA
SendMessageA
EnableWindow
SendDlgItemMessageA
__getmainargs
_unlink
_XcptFilter
_exit
_ismbblead
_cexit
exit
_acmdln
_initterm
_amsg_exit
__setusermatherr
_commode
_fmode
__set_app_type
memset
?terminate@@YAXXZ
_fsopen
memmove
srand
fwrite
rand
fclose
sprintf
_mbsicmp
_mbsnbicmp
__C_specific_handler
CertOpenStore
CertSetCertificateContextProperty
CertFreeCertificateContext
CertAddEncodedCertificateToStore
CertCloseStore
A0DB34FC6FE35D429A28ADDE5467D4D7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ