Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
475646ca6417088e0412847572312d27_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
475646ca6417088e0412847572312d27_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
475646ca6417088e0412847572312d27_JaffaCakes118
Size
857KB
MD5
475646ca6417088e0412847572312d27
SHA1
36c853a3c73b6603eb59829cb629ab8ef724f3d2
SHA256
e37b90f2fe75db9915ce75f8d9423e2b57634cbfa7c16ee8049a7eac5e9fc039
SHA512
88413ec59cf9aee6c155917d8f3facc70e3339abed21344547d5b3c51bf856c60a6e9229385810132a650716c77a54fa1db3a312fcc788a933c435f0dca3d16e
SSDEEP
12288:lcsnuPZ1H1+1D3UtuvE6352M2X15KPXUdq23ffkkkkkwfUl:ysuPZ1H1aDJvE63W5eIfR
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
k:\masque\install\Bootstrap\exe\Release\setup.pdb
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
URLDownloadToFileW
InternetCloseHandle
InternetReadFile
InternetOpenUrlW
InternetOpenW
SizeofResource
RaiseException
InitializeCriticalSection
LockResource
LoadResource
FindResourceExW
InterlockedDecrement
GetCommandLineW
GetCurrentThreadId
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetFileAttributesW
MultiByteToWideChar
GetModuleFileNameA
Sleep
GetLastError
SetFileAttributesW
GetModuleFileNameW
CreateDirectoryW
CopyFileW
GetVersionExW
LoadLibraryW
GetProcAddress
FreeLibrary
CloseHandle
CreateFileW
SetFilePointer
WriteFile
GetTempPathW
GetFileSize
ReadFile
GetSystemDirectoryW
DeleteCriticalSection
GetExitCodeProcess
lstrcmpiW
CreateThread
WaitForSingleObject
WideCharToMultiByte
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
ExitProcess
InterlockedIncrement
FindResourceW
SetStdHandle
SetLastError
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetWindowsDirectoryW
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
CreateFileA
GetConsoleMode
GetConsoleCP
GetModuleHandleA
RtlUnwind
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedCompareExchange
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
TerminateProcess
UnhandledExceptionFilter
UnregisterClassA
GetClientRect
GetSystemMetrics
LoadImageW
SetFocus
ShowWindow
GetDlgItem
SetWindowTextW
GetParent
GetSysColor
LoadCursorW
SetCursor
GetWindow
SystemParametersInfoW
GetWindowRect
MapWindowPoints
EndDialog
SetWindowPos
EnableWindow
ExitWindowsEx
CallWindowProcW
SendMessageW
DefWindowProcW
MessageBoxW
GetWindowLongW
GetKeyState
DialogBoxParamW
SetWindowLongW
SetTextColor
SetBkMode
GetStockObject
RegOpenKeyExW
RegCloseKey
FreeSid
EqualSid
GetTokenInformation
AllocateAndInitializeSid
RegQueryValueExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
ShellExecuteExW
SHGetSpecialFolderPathW
ShellExecuteW
CoUninitialize
CoCreateInstance
CoInitialize
PathRemoveFileSpecW
PathAppendW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ