Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2abca3766a98f7e06611018e2f0cfd3c_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2abca3766a98f7e06611018e2f0cfd3c_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
2abca3766a98f7e06611018e2f0cfd3c_JaffaCakes118
Size
1.4MB
MD5
2abca3766a98f7e06611018e2f0cfd3c
SHA1
d50e057690949d6df99c6b806471dd19686c9774
SHA256
c0a2a6c989b72d9641d980d03e9ceec62545c7d4fa4f438a20ccb29bbfa0b9e9
SHA512
3e563b210d2e4caf8e5ce3b434faadbeb3dfaad68f2b5b299c5f037fbe11e8b81daaf85f012889b3ab8cca6a56640687ebdc131259382d497aef5619a9ce0d7a
SSDEEP
12288:dbDpauiJ6xzXBoDajvwfUSb2Jby36rrKpiGYWF2xHg3eYEKsbn2b3P+FZMm74odL:dbDsuia9girrKIGnF2x9YEKsbscfE6
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
F:\liebao_src_pool\release.b57_stable_8002\src_import\build\Release\liebao_exe.pdb
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
SetEntriesInAclW
GetTokenInformation
EqualSid
DuplicateTokenEx
RegCloseKey
RegCreateKeyExW
RegOpenKeyW
RegQueryValueExW
OpenProcessToken
DuplicateToken
CreateRestrictedToken
CreateWellKnownSid
CopySid
GetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
SetTokenInformation
SetKernelObjectSecurity
GetSecurityDescriptorSacl
GetLengthSid
GetKernelObjectSecurity
GetAce
ConvertStringSidToSidW
ConvertSidToStringSidW
SetThreadToken
CreateProcessAsUserW
RegDisablePredefinedCache
RevertToSelf
SystemFunction036
RegOpenKeyExW
LookupPrivilegeValueW
GetProcessHeap
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentProcess
CreateProcessW
GetStartupInfoW
GetLocalTime
GetSystemInfo
GetTickCount
VirtualAlloc
VirtualFree
WriteProcessMemory
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
LoadLibraryExW
SetUnhandledExceptionFilter
WideCharToMultiByte
FlushInstructionCache
VirtualProtect
VirtualQuery
MultiByteToWideChar
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualProtectEx
WriteFile
GetCurrentProcessId
GetCurrentThreadId
LocalFree
FindFirstFileExW
GetVersionExW
GetNativeSystemInfo
ExpandEnvironmentStringsW
CreateEventW
IsDebuggerPresent
WaitForSingleObject
Sleep
CreateThread
RtlCaptureStackBackTrace
QueryPerformanceFrequency
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetUserDefaultLangID
RegisterWaitForSingleObject
UnregisterWaitEx
TerminateProcess
GetExitCodeProcess
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
GetModuleHandleExW
TlsSetValue
TlsAlloc
HeapSize
TlsFree
SetFilePointerEx
FlushFileBuffers
QueryDosDeviceW
ReadConsoleW
SetEvent
ResetEvent
SetInformationJobObject
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
VirtualQueryEx
HeapSetInformation
TerminateJobObject
GetUserDefaultLCID
VirtualAllocEx
GetThreadContext
AssignProcessToJobObject
GetFileType
SetHandleInformation
ProcessIdToSessionId
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
CreateRemoteThread
ReadProcessMemory
SuspendThread
ResumeThread
DebugBreak
SearchPathW
LoadLibraryExA
GetStringTypeW
EncodePointer
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
OutputDebugStringW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
HeapFree
HeapReAlloc
HeapAlloc
SetLastError
GetLastError
RaiseException
DuplicateHandle
CloseHandle
DecodePointer
SetFilePointer
ReadFile
GetFileAttributesW
FindNextFileW
FindClose
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
SetEnvironmentVariableW
GetCommandLineW
LoadLibraryW
lstrlenW
GetProcAddress
FreeLibrary
FreeEnvironmentStringsW
TlsGetValue
GetLongPathNameW
WriteConsoleW
EnumSystemLocalesW
RtlUnwind
ExitProcess
GetConsoleCP
GetConsoleMode
SetStdHandle
GetStdHandle
GetACP
IsValidLocale
SHGetValueW
GetMappedFileNameW
GetHandleVerifier
IsSandboxedProcess
base_cs_cmd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ