Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
3efcfb29205eb70138f53d4c2647a024_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3efcfb29205eb70138f53d4c2647a024_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
3efcfb29205eb70138f53d4c2647a024_JaffaCakes118
Size
3.5MB
MD5
3efcfb29205eb70138f53d4c2647a024
SHA1
5b6017fa349ca535bacce54b1e593fa5bf6daead
SHA256
57661a5d8773d91f4f9b86d7f02f20e2de439f76f24c8154589c333a3a9f9a58
SHA512
857afbbc22dc5dc1712b5aff27aeba34c3bb662e15d6d9f3382bf92d7bb231a57454450021abbbd3c3fd41316705573f05aa40acc0f0bec7c954b39bddc4c0a6
SSDEEP
49152:wn6ZlbpYLKGkVbyl4KQ3JHQE0ntoyTwp+CkmhKFOD9F9US6mJrbHkTjE9RNz6xBN:wn631YOZVIQREzCkoKcbHkTCRR6zS4tV
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\build\autobuild\ad647feb5fc3faa0\setupexe\m3_light\setupexe.pdb
ord137
ord169
ord88
ord70
ord190
ord141
ord175
ord17
GetTempPathW
GetLastError
GetProcAddress
LoadLibraryA
WTSGetActiveConsoleSessionId
DuplicateHandle
CloseHandle
GetVersion
LocalFree
GetCommandLineW
LoadLibraryW
CopyFileW
FormatMessageW
CompareStringW
MoveFileW
GetUserDefaultUILanguage
DeleteFileW
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
WriteFile
CreateFileW
MoveFileExW
CreateFileA
WaitForSingleObject
OpenProcess
SetFilePointer
CreateDirectoryW
GetTempFileNameW
LockResource
SizeofResource
LoadResource
FindResourceExA
HeapReAlloc
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
HeapFree
GetCurrentProcess
HeapAlloc
FreeLibrary
GetProcessHeap
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
GetSystemMetrics
EndDialog
MessageBoxExW
SetWindowTextW
EnableWindow
IsDlgButtonChecked
DialogBoxParamW
MessageBoxW
SetDlgItemTextA
LoadStringW
GetDlgItem
SetDlgItemTextW
RegQueryValueExW
RegCloseKey
ConvertSidToStringSidW
AdjustTokenPrivileges
GetLengthSid
RegOpenKeyExW
DuplicateTokenEx
LookupPrivilegeValueW
LookupAccountNameW
ConvertStringSidToSidW
EqualSid
CopySid
GetTokenInformation
OpenProcessToken
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteExW
StringFromGUID2
WTSQuerySessionInformationW
WTSEnumerateProcessesW
GetUserNameExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ