Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
322804fb5282ae7472fdba1c5814b247_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
322804fb5282ae7472fdba1c5814b247_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
322804fb5282ae7472fdba1c5814b247_JaffaCakes118
Size
368KB
MD5
322804fb5282ae7472fdba1c5814b247
SHA1
5ea02eb4fa7d167fc73b23827d637e50300456fc
SHA256
77576f563a5d29f9210a8baee84b9fd8a7e3bec1c4088e8fa339caa16f32b307
SHA512
54435173045288d97d46eedac6ff6acc6f81f98f6d0d070ce25684dfca98c52b3e0c8dca32ef2fb47068ac406d497a4c52342ff85792419b92c04aa40683c680
SSDEEP
6144:gJwx+zTO02TvEUSzi1G6/InjNx9LtEmCR1/gxKrpU1QUTivF:gJwx+zTBtzi18xzBEmCRixBivF
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\clientci\workspace\bdwebadapter_trunk_compile\Basic\Output\BinRelease\BDDownloadExe.pdb
CreateFileW
DeleteFileW
DecodePointer
ReadFile
GetCurrentThreadId
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
ExpandEnvironmentStringsW
QueryPerformanceCounter
GetLocalTime
GetTempPathW
CreateProcessW
CreateEventW
ResetEvent
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
FreeLibrary
GetCurrentProcess
SetUnhandledExceptionFilter
GetModuleHandleExW
GlobalMemoryStatusEx
GetCurrentProcessId
WaitForMultipleObjects
TerminateProcess
GetCommandLineW
CreateToolhelp32Snapshot
Process32FirstW
lstrcmpiW
Process32NextW
GetFileAttributesW
GetVersionExW
SetLastError
SetEvent
GetProcAddress
Sleep
CopyFileW
WideCharToMultiByte
GetFileSize
WriteFile
FindFirstFileW
FindClose
InterlockedDecrement
GlobalFree
InterlockedIncrement
DuplicateHandle
GetSystemDirectoryW
DeviceIoControl
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
OpenProcess
GetModuleHandleW
ProcessIdToSessionId
WTSGetActiveConsoleSessionId
InterlockedExchange
OutputDebugStringW
GetSystemInfo
GetModuleFileNameA
EncodePointer
GetStringTypeW
IsDebuggerPresent
ReadConsoleW
SetStdHandle
SetFilePointerEx
GetTimeZoneInformation
FlushFileBuffers
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
GetConsoleMode
LoadLibraryW
InitializeCriticalSectionAndSpinCount
SetEnvironmentVariableA
RaiseException
MultiByteToWideChar
DeleteCriticalSection
WaitForSingleObject
GetLastError
CloseHandle
WriteConsoleW
SetEndOfFile
GetTickCount
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetFileType
GetStdHandle
GetOEMCP
GetACP
IsValidCodePage
AreFileApisANSI
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
CreateDirectoryW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
CreateThread
ExitThread
LoadLibraryExW
IsProcessorFeaturePresent
FindFirstFileExW
GetDriveTypeW
DispatchMessageW
GetMessageW
IsWindow
FindWindowA
DefWindowProcW
TranslateMessage
PostMessageW
CreateWindowExW
SetWindowLongW
DestroyWindow
SendMessageTimeoutW
RegQueryValueExW
RegDeleteValueW
DuplicateTokenEx
CreateProcessAsUserW
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
RegSetValueExW
RegOpenKeyExW
RegCloseKey
CLSIDFromString
StringFromCLSID
SHCreateDirectoryExW
ord171
ShellExecuteW
ShellExecuteExW
ord165
CommandLineToArgvW
SHGetSpecialFolderPathW
PathAppendW
SHGetValueW
PathRemoveFileSpecW
PathFindFileNameW
SHDeleteKeyW
SHSetValueW
PathFileExistsW
Netbios
WTSQueryUserToken
CreateEnvironmentBlock
DestroyEnvironmentBlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ