Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3bb4c48cd2d3b4f932e050a162de2fd0_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3bb4c48cd2d3b4f932e050a162de2fd0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
3bb4c48cd2d3b4f932e050a162de2fd0_JaffaCakes118
Size
2.9MB
MD5
3bb4c48cd2d3b4f932e050a162de2fd0
SHA1
f7787903ae45bd88012ddb5691d57c327f017bf6
SHA256
3f8f39c152a2d56b9ff57a754ad83f4519829848ea07ec70d88ae2bc45a9d42e
SHA512
5f7ae06c01730e12ee78c0be4d267074e1d699a889e4d2e38500fca220ea3443384bff2a8dfa6b477fb785cd53e190864dfa545d67704663431e2a77ca489b33
SSDEEP
49152:x4r7P3TrAmsoXEFSjGDQXQ14tBmHx+w+islmQAI3gvJqamj6MCIW7Fy4ttr02TbB:wz5smj6Pvn6eQPq
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\Jenkins\Pokki (Sergey)\workspace\build\win32\Pokki\x64\Redist\ServiceStartMenuIndexer.pdb
LoadLibraryA
RaiseException
VerifyVersionInfoW
VerSetConditionMask
OpenProcess
GetModuleHandleW
lstrlenW
GetVersionExW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetCurrentProcess
GetModuleFileNameW
GetEnvironmentVariableW
GetUserDefaultUILanguage
GetLocaleInfoW
GetSystemDefaultUILanguage
GetSystemTime
RegisterWaitForSingleObject
UnregisterWaitEx
GetModuleHandleA
MoveFileExW
CopyFileW
LoadLibraryW
EnumResourceNamesW
LoadLibraryExW
GetFileAttributesW
GetCurrentThread
OutputDebugStringW
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
GetDiskFreeSpaceExW
GetFileAttributesExW
CreateDirectoryW
GetTempFileNameW
ExpandEnvironmentStringsW
GetTempPathW
GetFileInformationByHandle
CreateFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileTime
FindFirstFileExW
GetLongPathNameW
TlsGetValue
GetThreadLocale
TlsSetValue
TlsAlloc
SetThreadLocale
DisconnectNamedPipe
FlushFileBuffers
ReadFile
WriteFile
GetNamedPipeInfo
SetNamedPipeHandleState
WaitNamedPipeW
ConnectNamedPipe
CreateNamedPipeW
GetThreadPriority
SetThreadPriority
TerminateThread
FreeLibrary
CreateThread
Sleep
SetFilePointer
GetFileSize
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
TryEnterCriticalSection
CreateMutexA
ReleaseMutex
GetFileSizeEx
FreeResource
LockResource
LoadResource
SizeofResource
FindResourceW
CompareStringW
GetConsoleDisplayMode
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
GetStringTypeW
MultiByteToWideChar
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
ReleaseSemaphore
TlsFree
GetSystemInfo
OpenEventA
ResumeThread
SystemTimeToFileTime
SetWaitableTimer
CreateWaitableTimerA
FormatMessageA
WriteConsoleW
GetFileType
GetStdHandle
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
ExitProcess
GetCommandLineW
GetStartupInfoW
LCMapStringW
GetCPInfo
ExitThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
TerminateProcess
SetConsoleCtrlHandler
HeapSetInformation
GetVersion
HeapCreate
HeapDestroy
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
HeapSize
SetHandleCount
FatalAppExitA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
HeapReAlloc
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CreateFileA
SetStdHandle
SetEndOfFile
SetEnvironmentVariableA
GetProcAddress
LocalAlloc
CreateDirectoryA
GlobalMemoryStatus
FlushConsoleInputBuffer
ReadConsoleInputA
SetConsoleMode
PeekConsoleInputA
SetLastError
GetCurrentThreadId
LocalFree
GetCurrentProcessId
ProcessIdToSessionId
FreeConsole
AttachConsole
FindFirstChangeNotificationW
WaitForMultipleObjects
FindNextChangeNotification
GetLastError
CreateEventW
ResetEvent
WaitForSingleObject
CreateEventA
GetTickCount
SetEvent
FindCloseChangeNotification
HeapAlloc
WaitForSingleObjectEx
GetProcessHeap
HeapFree
GetExitCodeThread
CloseHandle
GetNumberOfConsoleInputEvents
GdipGetImageWidth
GdipCreateBitmapFromHBITMAP
GdipSaveImageToFile
GdipCloneImage
GdipDrawImageRectI
GdipGetImageGraphicsContext
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipGetImagePixelFormat
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipFree
GdipBitmapGetPixel
GdipBitmapSetPixel
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipCreateImageAttributes
GdipDisposeImageAttributes
GdipDeleteBrush
GdipCloneBrush
GdipSetClipRectI
GdipDrawImageRectRectI
GdipDrawImageRectRect
GdipDrawImage
GdipMeasureString
GdipGetImageHeight
GdipFillPath
GdipFillEllipse
GdipFillRectangle
GdiplusStartup
GdipGraphicsClear
GdipDrawRectangle
GdipDrawLines
GdipDrawLine
GdipSetSmoothingMode
GdipSetInterpolationMode
GdipSetTextRenderingHint
GdipSetCompositingQuality
GdipSetCompositingMode
GdipCreateFromHWNDICM
GdipCreateFromHWND
GdipCreateFromHDC
GdipAddPathLine
GdipClosePathFigures
GdipSetStringFormatTrimming
GdipSetStringFormatFlags
GdipCreateSolidFill
GdipSetImageAttributesWrapMode
GdipSetImageAttributesColorMatrix
GdipDeleteFont
GdipCreateFont
GdiplusShutdown
GdipDrawString
GdipCreateBitmapFromHICON
GdipDeletePen
GdipDeleteFontFamily
GdipGetGenericFontFamilySansSerif
GdipCreateFontFamilyFromName
GdipFlush
GdipDeletePath
GdipCreateStringFormat
GdipDeleteStringFormat
GdipCreatePath
GdipCreatePen1
ord410
ord412
ord413
htonl
SHGetSettings
SHGetKnownFolderPath
SHGetMalloc
SHGetFolderPathW
ShellExecuteW
SHAppBarMessage
ord25
ord195
SHParseDisplayName
SHGetFolderLocation
ord2
ord4
SHGetDesktopFolder
SHCreateItemFromParsingName
SHGetFileInfoW
ord727
SHQueryUserNotificationState
ShellExecuteExW
SHFileOperationW
SHBindToParent
CommandLineToArgvW
SHCreateDirectoryExW
CoCreateGuid
CoInitializeEx
CoTaskMemFree
StringFromGUID2
CoCreateInstance
PropVariantClear
CoUninitialize
VariantClear
VariantCopy
SysFreeString
SysAllocStringLen
SysAllocString
VariantInit
ord173
ord217
UuidCreateSequential
UuidToStringW
RpcStringFreeW
GetUserProfileDirectoryW
ExpandEnvironmentStringsForUserW
ord487
StrChrIW
SHStrDupW
ord176
StrRetToBufW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
BitBlt
GetBitmapBits
CreateCompatibleBitmap
GetDeviceCaps
CreateDCW
CreateDIBSection
SelectObject
DeleteDC
CreateCompatibleDC
GetObjectW
CreateBitmap
DeleteObject
GetDIBits
GetSaveFileNameW
InitializeAcl
ConvertSidToStringSidW
RegQueryValueExW
OpenThreadToken
RegOpenKeyW
GetSecurityDescriptorLength
FreeSid
SetEntriesInAclW
AllocateAndInitializeSid
RegOpenKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegCloseKey
RegSetValueExW
GetSidSubAuthority
GetTokenInformation
OpenProcessToken
RegEnumKeyExW
GetAce
GetSecurityInfo
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
AddAccessAllowedAceEx
AddAce
RegDeleteValueW
GetAclInformation
DeregisterEventSource
ReportEventW
RegisterEventSourceW
GetLengthSid
ConvertStringSidToSidW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ