Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
138b5cc8e7dcd60fbdb99898982ed606_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
138b5cc8e7dcd60fbdb99898982ed606_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
138b5cc8e7dcd60fbdb99898982ed606_JaffaCakes118
Size
9.2MB
MD5
138b5cc8e7dcd60fbdb99898982ed606
SHA1
8157e5c44df485d4ab29e637e0a4783c1d07c154
SHA256
237de1196f556a7b8f6d0c908025e1be7b5561cd9f7533f29d57076aec9176c2
SHA512
97999514d2e1b259c729dc2aed6cf8d0e962ffae2b92d1cd028e34a104e50cf1e8faf22d73939ec4974129dbe5bea5326169028a69979b839b76eab52c4ab411
SSDEEP
196608:Wegi7jbmj9kCADU91h+RXhKpBRGvMZU7nK2r2eTcuYH6TL:A+bG9ZADU91h+byRAMPOSPi
resource | yara_rule |
---|---|
sample | family_pandastealer |
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
UuidToStringW
GetCommandLineW
Sleep
ReleaseMutex
OutputDebugStringW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
TerminateProcess
FindFirstFileW
WinExec
FindClose
RemoveDirectoryW
GetCurrentProcess
LocalAlloc
CopyFileW
MoveFileW
GetTempFileNameW
SetEndOfFile
CreateFileW
SetCurrentDirectoryW
CreateMutexW
GetVersionExW
GetFileAttributesW
FindResourceA
CreateDirectoryW
GetTempPathW
CreateProcessW
FreeLibrary
WaitForSingleObject
DeleteFileW
CloseHandle
GetProcAddress
LoadLibraryW
SizeofResource
LockResource
LoadResource
GetLastError
MultiByteToWideChar
GlobalFree
LocalFree
GetCurrentProcessId
FindNextFileW
GetProcessHeap
SetEnvironmentVariableA
SetStdHandle
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetTickCount
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
InterlockedExchange
LoadLibraryA
RaiseException
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
GetStringTypeW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetCPInfo
HeapReAlloc
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
SetFileAttributesW
RtlUnwind
CompareStringW
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
SetFilePointer
ReadFile
FlushFileBuffers
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
wsprintfW
RegQueryInfoKeyW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
CommandLineToArgvW
ShellExecuteExW
CoCreateGuid
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
URLDownloadToFileW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ