Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
056c6cedff2225d014b1c519c81e94d3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
056c6cedff2225d014b1c519c81e94d3_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
056c6cedff2225d014b1c519c81e94d3_JaffaCakes118
Size
988KB
MD5
056c6cedff2225d014b1c519c81e94d3
SHA1
ead3c216067a7c0eae25483d114a215ebaecf1e2
SHA256
214ecd94a6edcc24f516310e73bd04d03db83911648248cb8a518a16adb64c30
SHA512
f738d6d2a7a9170e4ead74bb12e25ea79ce82fe23fb3e33ebc33ae58f6b121fef6cac3cddd71611b120aad1ecc10db4ffbd2db5a14ced1635307cf2d4eb59e8d
SSDEEP
12288:sqF1Wjf3etN23V4bkkLKJff6VTUCje7Od/3mtJC9TFWx1YKt0Puo:sqfN24BVoCje7+mtU9TF+t0P1
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\code\b5m-clt-bang5tao\B5TClient\bin\Release\B5TAssist.pdb
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpConnect
WinHttpCrackUrl
WinHttpSetTimeouts
WinHttpSetStatusCallback
WinHttpOpen
WinHttpWriteData
SetUnhandledExceptionFilter
Sleep
CreateEventW
WaitForSingleObject
SetEvent
CloseHandle
CreateThread
GetTickCount
CreateDirectoryW
GetTempPathW
GetTempFileNameW
MoveFileW
CreateProcessW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
WaitForMultipleObjects
WriteFile
ReadFile
SetFilePointerEx
SetEndOfFile
CreateFileW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
TerminateProcess
WTSGetActiveConsoleSessionId
GetModuleFileNameW
LocalFree
GetModuleHandleW
GetCurrentProcess
GetCurrentProcessId
CreateMutexW
WideCharToMultiByte
MultiByteToWideChar
SetFilePointer
FindClose
FindFirstFileW
GetDriveTypeW
SetErrorMode
GetVersionExW
DeleteFileA
lstrlenW
CreateFileA
OutputDebugStringA
ReleaseMutex
DeviceIoControl
SetPriorityClass
InterlockedDecrement
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
lstrlenA
TlsGetValue
TlsAlloc
FreeLibrary
GetProcAddress
IsValidCodePage
OutputDebugStringW
GetLastError
LoadLibraryW
GetLocaleInfoW
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeZoneInformation
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetStdHandle
GetProcessHeap
CompareStringW
GetOEMCP
GetACP
FlushFileBuffers
GetConsoleMode
GetConsoleCP
ExitProcess
GetFileType
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
HeapCreate
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
RaiseException
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
HeapReAlloc
HeapAlloc
HeapFree
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
InterlockedCompareExchange
InterlockedIncrement
SetEnvironmentVariableA
wsprintfW
MessageBoxA
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
OpenProcessToken
GetTokenInformation
LookupAccountSidW
SHGetFolderLocation
SHGetPathFromIDListW
ord155
ShellExecuteW
ord680
CoInitialize
CoCreateInstance
CoSetProxyBlanket
CoTaskMemFree
CoInitializeSecurity
CoUninitialize
SysAllocString
SysFreeString
VariantInit
VariantClear
UrlUnescapeW
PathFileExistsW
WTSQueryUserToken
GetModuleFileNameExW
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE