Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
f9589c8c7e2bd7997cc37b6b54ac6971_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f9589c8c7e2bd7997cc37b6b54ac6971_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Target
f9589c8c7e2bd7997cc37b6b54ac6971_JaffaCakes118
Size
639KB
MD5
f9589c8c7e2bd7997cc37b6b54ac6971
SHA1
a6f3f277634905693da64f2b5f5eaa981af450e5
SHA256
a112324c28e416cdc7f6de067d8529e1959bd68117b4332f0a685f7e497d094d
SHA512
f805396fa79a3cc85737d8241c484135aae6306c5f35ac8a4f0aa94330ab004488d25790a179dc1e37f9e50b646afedee48f34b14afdae801661bd1309afe5e6
SSDEEP
12288:nTx/B5R8wYDNqrKYRFXpfNzOd5BxpCLdXH+wKNnu2m:Tx/B5ewYsKUnNzO0LdXewKNnp
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\dbs\el\oc\target\x86\ship\click2run\x-none\perfboost.pdb
GetTokenInformation
OpenProcessToken
RegOpenKeyExW
RegCloseKey
IsValidSid
FreeSid
CreateWellKnownSid
EqualSid
RegGetValueW
EventWriteTransfer
EventRegister
EventUnregister
HeapFree
CreateEventExW
GetCurrentProcess
GetModuleFileNameW
CreateMutexW
OpenEventW
Sleep
GetLastError
SetEvent
CloseHandle
GetCurrentProcessId
GetProcessHeap
QueryPerformanceFrequency
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCurrentThread
GetThreadTimes
FindNextFileW
FindClose
CreateFileW
GetModuleHandleA
GetProcAddress
SetFilePointerEx
MultiByteToWideChar
WideCharToMultiByte
GetUserDefaultLCID
LCMapStringW
FreeLibrary
LocalFree
FormatMessageA
FindFirstFileExW
IsWow64Process
ReleaseSemaphore
GlobalFree
HeapAlloc
SetLastError
GetStringTypeW
GlobalMemoryStatusEx
RaiseException
LoadLibraryExW
GetModuleHandleW
GetVersionExW
InitializeCriticalSectionEx
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetTickCount64
TerminateProcess
GetModuleFileNameA
GetShortPathNameA
FindResourceW
SizeofResource
LoadResource
IsValidCodePage
FileTimeToSystemTime
FormatMessageW
GetLogicalProcessorInformation
WaitForSingleObjectEx
SignalObjectAndWait
GetProcessAffinityMask
CreateWaitableTimerW
GetCurrentThreadId
QueryDepthSList
TryEnterCriticalSection
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
GetFileType
WriteFile
FlsAlloc
TlsAlloc
FlsFree
TlsFree
FlsGetValue
TlsGetValue
FlsSetValue
TlsSetValue
GetModuleHandleExW
K32GetProcessMemoryInfo
LoadLibraryExA
VirtualQuery
GetSystemInfo
WriteConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
EnumSystemLocalesW
IsValidLocale
GetACP
DuplicateHandle
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
GetTickCount
GetLocaleInfoW
GetCPInfo
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
InterlockedFlushSList
CreateTimerQueue
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
FreeLibraryAndExitThread
VirtualAlloc
VirtualProtect
VirtualFree
UnregisterWaitEx
LoadLibraryW
HeapSize
HeapReAlloc
GetStdHandle
ExitProcess
StringFromGUID2
CoCreateGuid
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ