Extended Key Usages
ExtKeyUsageMicrosoftServerGatedCrypto
ExtKeyUsageNetscapeServerGatedCrypto
Behavioral task
behavioral1
Sample
fc650a1292ade32e41d3fdc2fb7dd3f3_JaffaCakes118.dll
Resource
win7-20240903-en
Target
fc650a1292ade32e41d3fdc2fb7dd3f3_JaffaCakes118
Size
124KB
MD5
fc650a1292ade32e41d3fdc2fb7dd3f3
SHA1
d13c28de3fa9ca7765b45e363f782b16702602e0
SHA256
58c39df99155017592abf60ec5a80a339f233bf1eb5dcf2ecf4a5b336cc56e58
SHA512
8f72fdb705819cb2335ce5408eb41b67ae87c2f4390d3866c85156e1e534e5d04c79d0eeca5d574464ccec1c6d809edba892eda6bf7eaf49d369ae0e872fa6e6
SSDEEP
3072:EbEDkJLdCb8BWQjzctLffJpmRAgdO+nLEDgMGNXopnbJ:EiSLdj02MLfhpmRtz4Dx7dJ
resource | yara_rule |
---|---|
sample | vmprotect |
ExtKeyUsageMicrosoftServerGatedCrypto
ExtKeyUsageNetscapeServerGatedCrypto
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsDebuggerPresent
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
wsprintfA
GetTokenInformation
CommandLineToArgvW
DiscpEstablishServiceLinkage
INIT_1
INIT_2
SvchostPushServiceGlobals
UsersRunDllW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ