Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Target
ba4c67347f53e44e5116cdfe46e077c6_JaffaCakes118
Size
326KB
MD5
ba4c67347f53e44e5116cdfe46e077c6
SHA1
4a49f6ffa6efba84ab11f7acdb6d53412237c6fc
SHA256
084ea0bdfabfa03853043e97027d1e25783b3a8f7912824e94aad8c097a20113
SHA512
d55e92e163dd18efafc17a95768270957103ae4cd4c1598d9ce73e3c77fbf3d8717426a2e592112b298129108fd45c9f7e24a52d67a8386bec31026496881a97
SSDEEP
6144:6eWwce4syTFx/pljNOvdSVfEygdKQIg/H1FGMZFLPN:h1E9Jv4FyhQ5/bGMrN
resource | yara_rule |
---|---|
sample | vmprotect |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
FltUnregisterFilter
FltParseFileNameInformation
FltReleaseFileNameInformation
FltSetCallbackDataDirty
FltRegisterFilter
FltStartFiltering
FltGetFileNameInformation
RtlInitUnicodeString
KdDisableDebugger
ExFreePoolWithTag
ExGetPreviousMode
PsCreateSystemThread
PsTerminateSystemThread
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
ZwClose
IoRegisterDriverReinitialization
RtlRandomEx
ZwDeleteFile
KdDebuggerEnabled
MmIsAddressValid
PsGetCurrentProcessId
RtlInitAnsiString
RtlWriteRegistryValue
RtlCreateRegistryKey
RtlAnsiStringToUnicodeString
RtlUnicodeStringToAnsiString
RtlCopyUnicodeString
RtlFreeUnicodeString
RtlFreeAnsiString
KeDelayExecutionThread
ExAllocatePool
PsGetVersion
IoCreateDevice
IoCreateFile
IoCreateSymbolicLink
IoGetDeviceObjectPointer
ObReferenceObjectByHandle
ObfDereferenceObject
ZwCreateFile
ZwOpenFile
ZwLoadDriver
ZwWriteFile
ZwOpenSymbolicLinkObject
ZwQuerySymbolicLinkObject
IoVolumeDeviceToDosName
IoQueryFileDosDeviceName
FsRtlIsNameInExpression
ZwQuerySystemInformation
IoFileObjectType
RtlCompareUnicodeString
KeStackAttachProcess
KeUnstackDetachProcess
PsLookupProcessByProcessId
PsGetProcessWow64Process
PsGetProcessPeb
ZwTerminateProcess
PsLookupThreadByThreadId
ZwAllocateVirtualMemory
KeInitializeApc
KeInsertQueueApc
KeInitializeEvent
KeSetEvent
KeWaitForSingleObject
ExAllocatePoolWithTag
MmProbeAndLockPages
IoAllocateIrp
IoAllocateMdl
IoBuildDeviceIoControlRequest
IoFreeIrp
IoFreeMdl
IoGetRelatedDeviceObject
__C_specific_handler
RtlEqualUnicodeString
KeAcquireSpinLockRaiseToDpc
KeReleaseSpinLock
MmMapLockedPagesSpecifyCache
MmGetSystemRoutineAddress
ZwUnmapViewOfSection
PsSetCreateProcessNotifyRoutine
PsGetProcessId
ObOpenObjectByPointer
ZwFlushInstructionCache
PsGetProcessImageFileName
PsGetProcessInheritedFromUniqueProcessId
ZwQueryInformationProcess
PsGetProcessExitProcessCalled
PsProcessType
PsInitialSystemProcess
KeClearEvent
IoReuseIrp
IoGetFileObjectGenericMapping
IoGetDeviceAttachmentBaseRef
ObCreateObject
SeCreateAccessState
ZwOpenKey
ZwDeleteKey
ZwEnumerateKey
ZwQueryKey
ZwQueryValueKey
RtlFormatCurrentUserKeyPath
IoCancelIrp
RtlAnsiCharToUnicodeChar
RtlUnicodeToMultiByteN
KeBugCheckEx
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
ExAllocatePool
ExFreePool
NtQuerySystemInformation
HalMakeBeep
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ