Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
TagRunner.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
TagRunner.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240412-en
Target
fccec3209e5c029071e6b1dfa5391fcb_JaffaCakes118
Size
6.1MB
MD5
fccec3209e5c029071e6b1dfa5391fcb
SHA1
7e490d5845eee80cacd2b705a4abf0f32c93aa33
SHA256
bd466c1b987253a2f6a36d1d0489e6ad35b854aabda680ad3a64819fcf0a75e0
SHA512
06cc0bcbf7fe0aeb76b03974704d70fa893acd82d4d9508a77bdc6886bfac00010eab512472d44db272613402c124b7b4930acfd3eb47dc30275038c0bd04b59
SSDEEP
196608:aoNsW9qReprVvQKapqQhW7PDv0/DGuHWjNNEOPlVV76ZOuVtN:aqP9sepaKSqiWHyTVOvV7sVb
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
FindFirstFileA
CreateDirectoryA
RemoveDirectoryA
FormatMessageA
ReadFile
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetEnvironmentVariableA
GetLogicalDriveStringsA
GetDriveTypeA
GetStringTypeExA
GetTempFileNameA
FindNextFileA
CreateProcessA
GetExitCodeProcess
GetVersion
lstrcmpA
GetDiskFreeSpaceA
GetModuleHandleA
MultiByteToWideChar
MulDiv
GetCurrentThreadId
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
OutputDebugStringA
LoadLibraryExA
GetSystemDefaultLangID
GetUserDefaultLangID
lstrcmpiA
GlobalMemoryStatus
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
lstrcpynA
lstrlenW
CreateMutexA
GetFileAttributesA
SetFileAttributesA
CopyFileA
ExitProcess
DebugBreak
HeapSize
HeapReAlloc
HeapDestroy
LocalAlloc
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrcatA
GetStartupInfoA
lstrcpyA
VirtualProtect
FindClose
lstrlenA
HeapFree
GetProcessHeap
InitializeCriticalSection
DeleteCriticalSection
RaiseException
GetModuleFileNameA
GetProcAddress
LoadLibraryA
ResetEvent
FlushFileBuffers
Sleep
WriteFile
MoveFileA
DeleteFileA
GetFileSize
SetFilePointer
CreateFileA
FindResourceExA
LoadResource
LockResource
SizeofResource
FindResourceA
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
CreateEventA
SetEvent
GetExitCodeThread
WaitForSingleObject
GetLastError
CreateThread
CloseHandle
FreeLibrary
VirtualAlloc
GetSystemInfo
VirtualQuery
EnumResourceLanguagesA
RtlUnwind
GetWindowDC
SetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
ScreenToClient
GetSubMenu
LoadMenuA
TrackPopupMenu
EnableMenuItem
ExitWindowsEx
GetDC
GetSystemMetrics
SetFocus
DefWindowProcA
CallWindowProcA
DestroyMenu
ReleaseDC
GetSystemMenu
DialogBoxParamA
LoadIconA
RedrawWindow
ShowWindow
CreateWindowExA
DestroyWindow
RemovePropA
SetPropA
GetDlgCtrlID
IsWindow
PostMessageA
MessageBoxA
KillTimer
EnableWindow
SetTimer
IsDialogMessageA
CreateDialogParamA
LoadImageA
PostQuitMessage
GetPropA
ModifyMenuA
GetActiveWindow
LoadStringA
SendMessageA
EndDialog
GetWindowLongA
GetWindow
SystemParametersInfoA
GetWindowRect
InvalidateRect
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
SetWindowTextA
GetDlgItem
UnregisterClassA
CharNextA
GetDesktopWindow
IsWindowVisible
wvsprintfA
SetWindowLongA
GetObjectA
CreateFontIndirectA
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetWindowExtEx
GetViewportExtEx
SetMapMode
GetMapMode
GetDeviceCaps
DeleteObject
GetStockObject
DeleteDC
SetBkMode
RegQueryInfoKeyA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
UnlockServiceDatabase
LockServiceDatabase
OpenSCManagerA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
RegOpenKeyA
RegEnumKeyExA
ShellExecuteA
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHBrowseForFolderA
CoTaskMemFree
CoInitialize
CreateStreamOnHGlobal
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CoCreateInstance
VarUI4FromStr
OleLoadPicture
PropertySheetA
CreatePropertySheetPageA
DestroyPropertySheetPage
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ