Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Behavioral task
behavioral1
Sample
155绿色软件站.url
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
155绿色软件站.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
digimizersetup.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
digimizersetup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
keygen.exe
Resource
win7-20240708-en
Target
bd5311a92305bb918365e0bd2c74e069_JaffaCakes118
Size
7.2MB
MD5
bd5311a92305bb918365e0bd2c74e069
SHA1
a87403f7f751862c1f65a3f28e5f20c9fedaf868
SHA256
15f0a2072436d93da7c01b107e41fb81e52147ffdc33eb2080e28fd613a29d46
SHA512
a483b7e4b0a202c57e3c0cd78aaecc335da39841b8d5a980a6c2411d712d5e2644b046a86f6c442633f40cfcbd0890bcd7666fa5f1f0b77e2c9ba18e721037af
SSDEEP
196608:RuEfs2f9w8OwUwfCFqZmRPhtKAG2Xwp9IxocFO7WYOFF82:4EU2lw8OxEYxxDKVEnTD82
resource | yara_rule |
---|---|
static1/unpack001/keygen.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/keygen.exe |
unpack002/out.upx |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
GetSystemTime
FindFirstFileA
FormatMessageA
ReadFile
CreateProcessA
GetExitCodeProcess
GetVersion
FindClose
GetDiskFreeSpaceA
GetModuleHandleA
CreateDirectoryA
GetEnvironmentVariableA
GetCurrentProcess
FlushInstructionCache
HeapAlloc
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
RemoveDirectoryA
OutputDebugStringA
LoadLibraryExA
EnumResourceLanguagesA
GetSystemDefaultLangID
GetUserDefaultLangID
GetTempPathA
GetTempFileNameA
FindNextFileA
GetLogicalDriveStringsA
GetDriveTypeA
GetSystemDirectoryA
MultiByteToWideChar
GlobalMemoryStatus
OpenProcess
TerminateProcess
CreateNamedPipeA
ConnectNamedPipe
SearchPathA
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
lstrcpynA
lstrlenW
GetShortPathNameA
CreateMutexA
SetCurrentDirectoryA
GetFileAttributesA
SetFileAttributesA
CopyFileA
HeapSize
HeapReAlloc
HeapDestroy
LocalAlloc
lstrlenA
GlobalAlloc
GlobalFree
GlobalUnlock
ExitProcess
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrcatA
lstrcpyA
VirtualProtect
GlobalLock
MulDiv
GetProcessHeap
HeapFree
DebugBreak
lstrcmpA
GetStringTypeExA
FreeLibrary
lstrcmpiA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
ResetEvent
FlushFileBuffers
Sleep
WriteFile
MoveFileA
DeleteFileA
GetFileSize
SetFilePointer
CreateFileA
SetEvent
CreateEventA
CreateThread
CloseHandle
TerminateThread
GetExitCodeThread
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
WideCharToMultiByte
RaiseException
FindResourceExA
LoadResource
LockResource
SizeofResource
FindResourceA
GetLastError
VirtualAlloc
GetSystemInfo
VirtualQuery
GetWindowsDirectoryA
RtlUnwind
ReleaseDC
GetWindowDC
ScreenToClient
GetSubMenu
LoadMenuA
TrackPopupMenu
EnableMenuItem
ExitWindowsEx
GetDC
GetSystemMetrics
LoadIconA
GetScrollPos
GetScrollRange
DestroyMenu
ModifyMenuA
DefWindowProcA
CallWindowProcA
GetSystemMenu
SetForegroundWindow
RemovePropA
SetPropA
GetDlgCtrlID
MessageBoxA
KillTimer
EnableWindow
SetTimer
CreateDialogParamA
MsgWaitForMultipleObjects
DialogBoxParamA
GetForegroundWindow
GetActiveWindow
SetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
SetWindowLongA
InvalidateRect
SetWindowPos
RedrawWindow
SetFocus
MessageBeep
SendMessageA
SetDlgItemTextA
GetWindowTextA
GetWindowTextLengthA
LoadImageA
DispatchMessageA
TranslateMessage
PeekMessageA
MapWindowPoints
GetWindowRect
CreateWindowExA
IsWindow
GetClientRect
DestroyWindow
GetWindowLongA
EndDialog
GetWindow
SystemParametersInfoA
GetPropA
PostQuitMessage
FindWindowA
PostMessageA
CopyRect
GetParent
GetDlgItem
wvsprintfA
IsWindowVisible
GetDesktopWindow
CharNextA
UnregisterClassA
SetWindowTextA
LoadStringA
ShowWindow
GetObjectA
CreateFontIndirectA
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetWindowExtEx
GetViewportExtEx
SetMapMode
GetMapMode
GetDeviceCaps
DeleteObject
GetStockObject
DeleteDC
SetBkMode
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
RegQueryInfoKeyA
RegDeleteKeyA
StartServiceA
QueryServiceStatus
OpenServiceA
RegDeleteValueA
GetUserNameA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
UnlockServiceDatabase
RegEnumKeyExA
OpenSCManagerA
LockServiceDatabase
AdjustTokenPrivileges
SHBrowseForFolderA
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
CoUninitialize
CoInitialize
CoTaskMemFree
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CreateStreamOnHGlobal
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
VarUI4FromStr
OleLoadPicture
PropertySheetA
CreatePropertySheetPageA
DestroyPropertySheetPage
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE