Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
155绿色软件站.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
155绿色软件站.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
3D-FTP_Setup.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
3D-FTP_Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Crack/3dftp.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Crack/3dftp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Crack/ArmAccess.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Crack/ArmAccess.dll
Resource
win10v2004-20240802-en
Target
d1c004f90cd17577ae2c7d0d8f11ea5e_JaffaCakes118
Size
11.2MB
MD5
d1c004f90cd17577ae2c7d0d8f11ea5e
SHA1
61e88bd4dc4b2eec1a4e210cdfc00a24a939f904
SHA256
4766c90eb36f6e35878f78e506f6d695dc079787403d33d9373c7578a75f5f3d
SHA512
5f74050fa64a12c9bca1a24bc73bb5a5b2041472a2f0810f38e37346f683e76d19ca4ef1e7328921ae26f8df3e4ec1388690ac7f11d94d91c8f865fbd746d3b0
SSDEEP
196608:vFwJ7kA3BaWcfUk7XyZ1zC/wmXBQPQ3qYC3v7QbByjemv1AmCjcuwTk:vuJRRa9f9reC/wmXBAQ80tKemv1ALQuf
Checks for missing Authenticode signature.
resource |
---|
unpack001/Crack/3dftp.exe |
unpack001/Crack/ArmAccess.dll |
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
FindFirstFileA
CreateDirectoryA
RemoveDirectoryA
FormatMessageA
ReadFile
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetEnvironmentVariableA
GetLogicalDriveStringsA
GetDriveTypeA
GetTempFileNameA
FindNextFileA
CreateProcessA
GetExitCodeProcess
GetVersion
GetDiskFreeSpaceA
GetModuleHandleA
MultiByteToWideChar
GetCurrentProcess
FlushInstructionCache
HeapAlloc
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
MulDiv
OutputDebugStringA
LoadLibraryExA
GetSystemDefaultLangID
GetUserDefaultLangID
lstrcmpiA
GlobalMemoryStatus
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
lstrcpynA
lstrlenW
CreateMutexA
GetFileAttributesA
SetFileAttributesA
CopyFileA
ExitProcess
DebugBreak
HeapSize
HeapReAlloc
HeapDestroy
LocalAlloc
FindClose
lstrlenA
GetProcessHeap
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStartupInfoA
lstrcatA
lstrcpyA
VirtualProtect
HeapFree
InitializeCriticalSection
DeleteCriticalSection
lstrcmpA
GetThreadLocale
GetStringTypeExA
RaiseException
GetModuleFileNameA
GetProcAddress
LoadLibraryA
ResetEvent
FlushFileBuffers
Sleep
WriteFile
MoveFileA
DeleteFileA
GetFileSize
SetFilePointer
CreateFileA
FindResourceExA
LoadResource
LockResource
SizeofResource
FindResourceA
WideCharToMultiByte
GetVersionExA
GetLocaleInfoA
GetACP
InterlockedExchange
CreateEventA
SetEvent
GetLastError
CreateThread
CloseHandle
TerminateThread
GetExitCodeThread
WaitForSingleObject
FreeLibrary
VirtualAlloc
GetSystemInfo
VirtualQuery
EnumResourceLanguagesA
RtlUnwind
EmptyClipboard
CloseClipboard
OpenClipboard
ScreenToClient
GetSubMenu
LoadMenuA
TrackPopupMenu
EnableMenuItem
ExitWindowsEx
GetDC
GetSystemMetrics
SetFocus
DestroyMenu
ModifyMenuA
DefWindowProcA
CallWindowProcA
SetClipboardData
DialogBoxParamA
LoadIconA
InvalidateRect
ShowWindow
CreateWindowExA
RemovePropA
SetPropA
GetDlgCtrlID
IsWindow
PostMessageA
MessageBoxA
KillTimer
EnableWindow
SetTimer
DestroyWindow
CreateDialogParamA
GetWindowDC
ReleaseDC
LoadImageA
PostQuitMessage
GetPropA
GetSystemMenu
GetActiveWindow
LoadStringA
SetWindowLongA
SendMessageA
EndDialog
GetWindow
SystemParametersInfoA
GetWindowRect
RedrawWindow
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
GetDlgItem
SetWindowTextA
wvsprintfA
CharNextA
UnregisterClassA
GetDesktopWindow
IsWindowVisible
GetWindowLongA
GetObjectA
CreateFontIndirectA
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetWindowExtEx
GetViewportExtEx
SetMapMode
GetMapMode
GetDeviceCaps
DeleteObject
GetStockObject
DeleteDC
SetBkMode
RegQueryInfoKeyA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
UnlockServiceDatabase
LockServiceDatabase
OpenSCManagerA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
RegOpenKeyA
RegEnumKeyExA
ShellExecuteA
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHBrowseForFolderA
CoTaskMemFree
CoInitialize
CreateStreamOnHGlobal
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CoCreateInstance
VarUI4FromStr
OleLoadPicture
PropertySheetA
CreatePropertySheetPageA
DestroyPropertySheetPage
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetLastError
GetEnvironmentVariableA
CreateMailslotA
CreateFileA
CloseHandle
GetLastError
SetEnvironmentVariableA
ReadFile
WriteFile
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
MultiByteToWideChar
GetLocaleInfoA
SendMessageA
IsWindow
GetWindowThreadProcessId
SysAllocStringByteLen
CallBuyNowURL
CallBuyNowURLEx
CallCustomerServiceURL
ChangeHardwareLock
CheckCode
ConnectedToServer
CopiesRunning
DllRegisterServer
DllUnregisterServer
Environ
ExpireCurrentKey
FixClock
GetShellProcessID
GetUserString
IncrementCounter
InstallKey
InstallKeyLater
NANOBEGIN
NANOEND
RawFingerprintInfo
SECUREBEGIN
SECUREBEGIN_A
SECUREBEGIN_B
SECUREBEGIN_C
SECUREBEGIN_D
SECUREBEGIN_E
SECUREBEGIN_F
SECUREBEGIN_G
SECUREBEGIN_H
SECUREBEGIN_I
SECUREBEGIN_J
SECUREBEGIN_K
SECUREEND
SECUREEND_A
SECUREEND_B
SECUREEND_C
SECUREEND_D
SECUREEND_E
SECUREEND_F
SECUREEND_G
SECUREEND_H
SECUREEND_I
SECUREEND_J
SECUREEND_K
SetDefaultKey
SetUserString
ShowEnterKeyDialog
ShowReminderMessage
ShowReminderMessage2
UninstallKey
UpdateEnvironment
VBGetCommandLine
VBGetUserString
VerifyKey
WriteHardwareChangeLog
_GetCommandLine
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ