Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
14dbeade68bb4dc8b418b845fd14bbea_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14dbeade68bb4dc8b418b845fd14bbea_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
14dbeade68bb4dc8b418b845fd14bbea_JaffaCakes118
Size
107KB
MD5
14dbeade68bb4dc8b418b845fd14bbea
SHA1
50943fb88920d520198dca3238148a316a5b66a2
SHA256
244aeca8cb2e3b56f317072b62dabcc5f1bee62de56614be8143e76191b2e621
SHA512
f4062c64b448ab5095fb1b5065475f7f990d7f54d3c08b5b3b12caa0189f073b33de0e302074c2126cca72ef3361a1803b6e3e8cd7ebb7fa5e9c5eeb90dc79d1
SSDEEP
1536:7FSEKchFKJhnzcOwPSQsdKMwiIVhvrKFX:hSwOAOwPSQpiI3vrKF
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\smartloader\kernel_proj\trunk\kernel_smartloader\bin\ReleaseA\pdb\KernelSmartLoader.pdb
CreateProcessA
OutputDebugStringA
CreateToolhelp32Snapshot
Process32First
Module32First
Module32Next
GetProcAddress
LoadLibraryA
Process32Next
FreeLibrary
CreateFileA
GetFileAttributesA
FileTimeToSystemTime
ReadFile
GetPrivateProfileStringA
SetEndOfFile
CreateDirectoryA
GetVersionExA
CopyFileA
GetProcessTimes
FileTimeToLocalFileTime
SetFilePointer
GetModuleHandleA
WriteFile
CloseHandle
GetCurrentProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
GetPrivateProfileIntA
GetModuleFileNameA
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
TranslateAcceleratorA
CreateAcceleratorTableA
DispatchMessageA
GetMessageA
DestroyAcceleratorTable
TranslateMessage
SHGetSpecialFolderPathA
CoUninitialize
CoInitialize
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AV?$_String_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@V?$_String_const_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@0@Z
_exit
memset
??3@YAXPAX@Z
_invalid_parameter_noinfo
_localtime64
_time64
_access
strftime
_getpid
strtoul
_snprintf_s
_vsnprintf_s
strcpy_s
_mbschr
_mbsnbcpy_s
_chmod
strcat_s
_unlink
_mbsrchr
_stricmp
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
__CxxFrameHandler3
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_crt_debugger_hook
_invoke_watson
_controlfp_s
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE