Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3df3584002c65784f29a06aaf9abaf67_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3df3584002c65784f29a06aaf9abaf67_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
3df3584002c65784f29a06aaf9abaf67_JaffaCakes118
Size
1.5MB
MD5
3df3584002c65784f29a06aaf9abaf67
SHA1
0f97c02abdd4588361d046173cd511e9520af699
SHA256
16ee9a18441949be7ab2028fe37e45081dc40d7377ed46f2785c1f5e822328c1
SHA512
68dea7c682268ca8d93e214b58c927a931fad6ef753d22d8f3bfa1d66fb3a8200e51c92ec8475a3bfaf7282feaa4b632d9d2743d59b9f14367f9b581ad9310c6
SSDEEP
24576:YBdtPWIyXq0WoWU3uSgGBk6wRAO/Clvps3AoVnuRxRh0YookNLHpOUBjwYQr69tq:YBn9y6joWU3tg8QRzEveFah0o4zpp8Kq
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\sbsrc\trunk2005\helpers\packsetup2\BI-Release\baseinstaller.pdb
CreateDirectoryA
FindFirstFileA
SetFileAttributesA
GetTempFileNameA
FindClose
Process32Next
LockResource
GetModuleFileNameA
FindNextFileA
GetModuleHandleA
CreateToolhelp32Snapshot
CloseHandle
GetTempPathA
DeleteFileA
lstrcpyA
DosDateTimeToFileTime
SetFilePointer
SystemTimeToFileTime
GetCurrentProcess
SetFileTime
WriteFile
GetFileType
GetCurrentDirectoryA
ReadFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetProcessHeap
SetEndOfFile
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
GetLocaleInfoA
LoadLibraryA
GetFileAttributesA
SizeofResource
GetWindowsDirectoryA
LoadResource
Process32First
MoveFileExA
lstrlenA
FindResourceA
GetFileSize
CreateFileA
HeapSize
FlushFileBuffers
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
DeleteCriticalSection
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
Sleep
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetConsoleCP
GetConsoleMode
EndPaint
DestroyWindow
RegisterClassExA
PostQuitMessage
GetClassInfoExA
WaitForInputIdle
wsprintfA
GetClientRect
BeginPaint
SetWindowLongA
MessageBoxA
InvalidateRect
GetWindowLongA
CreateWindowExA
PeekMessageA
DefWindowProcA
ShowWindow
DispatchMessageA
GetSystemMetrics
LoadCursorA
MoveWindow
TranslateMessage
SelectObject
Rectangle
GetStockObject
Polygon
RegFlushKey
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
ShellExecuteExA
SHFileOperationA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE