Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
07920156ece7df9515958e264dc8967b_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
07920156ece7df9515958e264dc8967b_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
07920156ece7df9515958e264dc8967b_JaffaCakes118
Size
714KB
MD5
07920156ece7df9515958e264dc8967b
SHA1
ea0afe13a85333ae0867d8bfb629f1e2ff0b505c
SHA256
304fb730f334b57fd6936efc727fff48a8706d6c0981775f8e4b69ef12b94dd7
SHA512
7694d790d1e592db0657b085077e086f54cc3f4dbd4ed5de8352085ab1053bb49989297a5b396bce5a62d010cf244cf898165d251041604a4ef195c964724c22
SSDEEP
12288:oVmV+thcefuRBkNIn3mHoHfwYi8gS+VvxuiITVDYZcpA7pKUV1CnrstqaWo:Q4+7c5c58ClAEpLCIttp
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\svnroot\kuaizip\trunk\bin\Release\X86\KzUpdateAgency.pdb
LoadLibraryW
GetModuleHandleExW
GetModuleFileNameW
ExpandEnvironmentStringsA
LoadLibraryA
GetProcAddress
FreeLibrary
GetStdHandle
GetFileType
WaitForMultipleObjects
PeekNamedPipe
ReadFile
VerSetConditionMask
VerifyVersionInfoA
SleepEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
Sleep
GetLastError
FormatMessageA
SetLastError
GetTickCount
CloseHandle
CreateProcessA
GetExitCodeProcess
WaitForSingleObject
lstrcmpiA
GetTempFileNameA
GetTempPathA
Process32NextW
Process32FirstW
GetProcessHeap
SetEndOfFile
CreateFileW
SetEnvironmentVariableA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
GetTimeZoneInformation
GetStringTypeA
IsValidLocale
WideCharToMultiByte
MultiByteToWideChar
Process32First
Process32Next
CreateToolhelp32Snapshot
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InterlockedCompareExchange
GetLocaleInfoA
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
HeapReAlloc
HeapAlloc
GetSystemTimeAsFileTime
ExitThread
GetCurrentThreadId
CreateThread
GetCurrentProcessId
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
SetFilePointer
FindClose
GetDriveTypeA
FindFirstFileA
RtlUnwind
GetModuleHandleW
ExitProcess
RaiseException
LCMapStringA
LCMapStringW
GetCPInfo
CompareStringA
CompareStringW
GetTimeFormatA
GetDateFormatA
GetStringTypeW
WriteFile
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapCreate
VirtualFree
VirtualAlloc
SetHandleCount
GetStartupInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetModuleHandleA
SetStdHandle
GetFullPathNameA
GetCurrentDirectoryA
HeapSize
InitializeCriticalSectionAndSpinCount
GetUserDefaultLCID
EnumSystemLocalesA
RegCreateKeyExA
RegOpenKeyExA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
OpenSCManagerA
RegOpenCurrentUser
RegOpenKeyExW
RegCloseKey
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptAcquireContextA
CryptImportKey
CryptReleaseContext
CryptEncrypt
CryptDestroyKey
RegQueryValueExA
SHGetSpecialFolderPathA
StrStrIA
PathRemoveExtensionA
PathAddExtensionA
PathFileExistsW
PathFileExistsA
getsockname
setsockopt
WSAIoctl
ntohs
bind
htons
getsockopt
getpeername
closesocket
send
recv
select
WSAGetLastError
__WSAFDIsSet
WSASetLastError
WSAStartup
WSACleanup
gethostname
ioctlsocket
socket
connect
freeaddrinfo
getaddrinfo
sendto
recvfrom
accept
listen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ