Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Behavioral task
behavioral1
Sample
155绿色软件站.url
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
155绿色软件站.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Patch.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Patch.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Splash PRO.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Splash PRO.exe
Resource
win10v2004-20240802-en
Target
b93540b9c4c426d682e782ed603ba6ff_JaffaCakes118
Size
14.2MB
MD5
b93540b9c4c426d682e782ed603ba6ff
SHA1
8f85d85578ccd29aefb4065e69ad3fd3c15bb62f
SHA256
1180240f7dbbc347c080f4d61b1e195b178b86b45f945f20613d587d3d5300ae
SHA512
fc48db58815623ecb2b8685f00ff26a230140d24bec101370aa2af7a78b9caadbcd9f8ca48094848185692deb4dfe1dbdba0c928b8ad7cb5dae20ef84cc3d670
SSDEEP
196608:1G3KJh+aH62wDStE1UyhS86hdgQvlNxC+Y4bBW5syNjLFCqgs8RZ+LyQTq8xlOdx:1ZLVQ08k7vlTvY4VW5Lvgs8WuIqqwjcA
resource | yara_rule |
---|---|
static1/unpack001/Patch.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/Patch.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
RegCloseKey
RegCreateKeyExA
RegSetValueExA
AddAtomA
CloseHandle
CreateDirectoryW
CreateFileW
DeleteFileW
ExitProcess
FindAtomA
GetAtomNameA
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
GetSystemTime
GetTempPathW
MoveFileExW
SetCurrentDirectoryW
SetUnhandledExceptionFilter
SystemTimeToFileTime
WriteFile
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_close
_iob
_lseek
_onexit
_open
_read
_setmode
_write
abort
atexit
fflush
fprintf
free
malloc
rand
signal
sprintf
srand
strcpy
strncpy
strrchr
swprintf
ShellExecuteW
CreateWindowExA
DefWindowProcA
LoadCursorA
LoadIconA
MessageBoxA
PostQuitMessage
RegisterClassExA
ShowWindow
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE