Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3035693137f153ef3e1213a945d33e00_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3035693137f153ef3e1213a945d33e00_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
3035693137f153ef3e1213a945d33e00_JaffaCakes118
Size
1.1MB
MD5
3035693137f153ef3e1213a945d33e00
SHA1
175f680ed04a381663a594189750b450a1f86229
SHA256
646be34566c6b635f9d32fdd54ae7824255a363de2a12d084a1797c3c43ad3a1
SHA512
802553d8bd67880efb346ca188b5e7b17d95feafe65018b1d87d372d146c5bbf417040493c527bad1fcbe32c62b6639b00220340226c1cae1ed6640cf94f155c
SSDEEP
24576:EajdfaPxG9nn8j47jM1hubVwm2I45pqLrldE0eQiUMBD:EajdfapG9nn8kfY2VF2J5pqLrldEyiU+
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\KINGSOFT_DUBA\Build\Build_Src\kisengine\kisengine\product\win32\dbginfo\kinst_exe.pdb
WriteFile
SetEndOfFile
GetTickCount
GetWindowsDirectoryW
FindClose
GetProcAddress
GetSystemDirectoryW
GetVersionExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
LoadLibraryW
LocalAlloc
LocalFree
GetCurrentProcess
GetSystemTimeAsFileTime
InterlockedCompareExchange
GetSystemInfo
FileTimeToSystemTime
GetLocalTime
FileTimeToLocalFileTime
GetUserDefaultLangID
DeviceIoControl
CreateFileA
LoadLibraryA
CreateDirectoryW
DeleteFileW
OpenSemaphoreW
GetCurrentProcessId
ProcessIdToSessionId
ExpandEnvironmentStringsW
Sleep
CreateProcessW
GetSystemTime
SetUnhandledExceptionFilter
CreateThread
SetEvent
GetLogicalDriveStringsW
QueryDosDeviceW
lstrcpyW
lstrcatW
GetModuleHandleA
GetVersion
GetFileType
GetStdHandle
QueryPerformanceCounter
GlobalMemoryStatus
FlushConsoleInputBuffer
GetCurrentDirectoryA
GetFullPathNameA
FindFirstFileA
GetDriveTypeA
ExpandEnvironmentStringsA
FormatMessageA
GetSystemDirectoryA
SleepEx
SetEnvironmentVariableA
CompareStringW
GetFileAttributesW
CreateFileW
ReadFile
SetFilePointer
OpenMutexW
lstrlenA
WideCharToMultiByte
TerminateThread
WaitForSingleObject
LeaveCriticalSection
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
lstrcmpiW
GetCurrentThreadId
FindResourceExW
InitializeCriticalSection
UnmapViewOfFile
LockResource
CloseHandle
FreeLibrary
LoadLibraryExW
MapViewOfFileEx
GetModuleFileNameW
EnterCriticalSection
FindResourceW
CreateFileMappingW
LoadResource
GetModuleHandleW
SizeofResource
GetLastError
lstrlenW
RaiseException
OpenEventW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
SetStdHandle
FlushFileBuffers
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleCP
GetTimeZoneInformation
GetStartupInfoA
SetHandleCount
IsValidCodePage
GetOEMCP
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
HeapCreate
VirtualAlloc
VirtualFree
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
SetConsoleCtrlHandler
GetStartupInfoW
ExitProcess
InterlockedExchange
GetVersionExA
GetACP
GetLocaleInfoA
GetThreadLocale
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
ExitThread
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
VirtualQuery
CharNextW
DestroyWindow
UnregisterClassA
GetUserObjectInformationW
GetProcessWindowStation
MessageBoxA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
CreateProcessAsUserW
SetTokenInformation
DuplicateTokenEx
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
RegOpenKeyW
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
SHGetSpecialFolderPathW
CoSetProxyBlanket
CoInitializeEx
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
VarUI4FromStr
SysFreeString
SysAllocString
VariantInit
VariantClear
SysStringLen
PathRemoveFileSpecW
StrToIntW
PathFindFileNameW
PathFindExtensionW
PathFileExistsW
PathAddBackslashW
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
WTSFreeMemory
WTSEnumerateSessionsW
IcmpCreateFile
IcmpCloseHandle
IcmpSendEcho
UuidCreate
GetProcessImageFileNameW
GetModuleFileNameExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ