Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
Behavioral task
behavioral1
Sample
014b034c31bad3de54f3af82d2576d96_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
014b034c31bad3de54f3af82d2576d96_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/isecur.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/isecur.dll
Resource
win10v2004-20240802-en
Target
014b034c31bad3de54f3af82d2576d96_JaffaCakes118
Size
72KB
MD5
014b034c31bad3de54f3af82d2576d96
SHA1
8a5161ef2bb2da7bddaf765bcc80d9ec47c54f18
SHA256
ea1d8ec418274a0c6da1b9130c989da86d6ea41ce27eb05ace4c9ade99465d3e
SHA512
aedd1d140c119a445d4149206a7fec6c6c9fe328a59234e342cc99cee664ddad8fc4dba4fcceb83e74d020a3ec4cf3eff2baae09a8bcc4abbcef242671a0ccc3
SSDEEP
1536:RtVRpxjnaaGKsUz9owWm0qDEzX3OoM+VeH/pmNc895f:RvnBaaWYqwWTqDELOaVc/pmmK5f
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/isecur.dll |
unpack001/out.upx |
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
GetPrivateProfileIntA
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
MultiByteToWideChar
GlobalAlloc
GetDlgCtrlID
GetClientRect
SetWindowRgn
MapWindowPoints
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
PtInRect
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
LoadIconA
SetTextColor
GetObjectA
SelectObject
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
CreateCompatibleDC
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapFree
GetProcessHeap
SetFileAttributesA
GetFileAttributesA
FreeLibrary
HeapAlloc
HeapReAlloc
GetTempFileNameA
GetTempPathA
MulDiv
GetTickCount
CloseHandle
WriteFile
ReadFile
CreateFileA
DeleteFileA
WaitForMultipleObjects
LoadLibraryExA
CreateEventA
SetFilePointer
GetModuleFileNameA
InterlockedExchange
RtlUnwind
LoadLibraryA
lstrlenA
CreateProcessA
GetLastError
GlobalAlloc
VirtualQuery
lstrcpynA
lstrcpyA
WaitForSingleObject
GlobalFree
RegisterWindowMessageA
SetWindowLongA
SetDlgItemTextA
MessageBoxA
wsprintfA
SendMessageA
GetWindowRect
AnyPopup
CallWindowProcA
CharLowerBuffA
DestroyWindow
EnableWindow
GetWindowLongA
CreateWindowExA
FindWindowExA
GetDlgItem
GetFocus
IsWindowVisible
ShowWindow
GetClientRect
SetWindowTextA
RegCloseKey
RegOpenKeyA
RegSetValueExA
RegEnumValueA
RegQueryValueExA
InternetConnectA
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetSetFilePointer
InternetCrackUrlA
FindCloseUrlCache
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
HttpOpenRequestA
HttpSendRequestA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
download
getidex
skipcomponents
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ