Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
fbd22bab4656a731db049b0beb71cf98_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fbd22bab4656a731db049b0beb71cf98_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Target
fbd22bab4656a731db049b0beb71cf98_JaffaCakes118
Size
102KB
MD5
fbd22bab4656a731db049b0beb71cf98
SHA1
e747766e23008bca438d149d4d3311fd8cf06204
SHA256
7840ec3026b6b1a5f8397afaac92238eb4cf6705636e21ebc4c4dd04a35c4cb5
SHA512
062599eb56c9658b2bc0cde05c0b1dcdf8332065bf1a42fb06e461e894555c5693a9e9a0ab96042ea862a4ff220c0002c5c1d445af98ca240f584487642cc00d
SSDEEP
3072:VpBRqqWephm3b1FUIoJ/VlqYWDdedudee:LBRq1B3bP9AIdedud9
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
C:\Symbols\Release\SrvLnch.pdb
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetSystemTime
SetEvent
OpenEventA
CompareFileTime
SystemTimeToFileTime
GetLocalTime
GetExitCodeProcess
TerminateProcess
CreateProcessA
GetSystemDirectoryA
GetWindowsDirectoryA
GetFileAttributesA
CreateMutexA
ReleaseMutex
WaitForMultipleObjectsEx
WaitForMultipleObjects
GetVersion
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
CreateFileA
GetLocaleInfoA
LoadLibraryA
GetProcAddress
GetCurrentProcess
GetModuleHandleA
CreateEventA
WaitForSingleObject
CloseHandle
Sleep
GetModuleFileNameA
GetVersionExA
GetLastError
FreeLibrary
ExitProcess
ReadFile
HeapSize
SetEndOfFile
lstrcmpiA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
RtlUnwind
HeapAlloc
HeapFree
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
GetCPInfo
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
InterlockedExchange
VirtualQuery
WriteFile
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
VirtualProtect
GetSystemInfo
CharLowerA
MessageBoxA
ExitWindowsEx
LoadStringA
RegDeleteKeyA
RegEnumKeyA
RegEnumValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
QueryServiceStatusEx
ChangeServiceConfig2A
OpenSCManagerA
OpenServiceA
QueryServiceConfigA
CloseServiceHandle
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegEnumKeyExA
RegCloseKey
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ