Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
4755a00e98c72f97f4fe68de47c954c7_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4755a00e98c72f97f4fe68de47c954c7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
4755a00e98c72f97f4fe68de47c954c7_JaffaCakes118
Size
164KB
MD5
4755a00e98c72f97f4fe68de47c954c7
SHA1
488b1957ffa055efb6d93de089483204f1c6f77b
SHA256
9f4c7e8414d18c9fa1799561ee8858dd5ce1d067f1e43dd47ceee1a563eb49d0
SHA512
270cfb9ca388f520c114a287a68f1a96f3a20f650e5dcc45e866366a092147279e6ac87b610a6916c57bc4bb9b7ce39e40202eae8b626121a285f0f8bd2fa671
SSDEEP
3072:9LAeNmwWBSy0J+P1I3vlP4J5/oOnHOs6CF6veNVEdvFdcflCMX4JgaeQD:9LAeswHvJ+0vlP8b6Y6veN4LOPX4GpI
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\jenkins_home\workspace\PPTVClient_Jenkins_Release\output\Win32_Release\pdb\PE.pdb
LoadLibraryW
GetModuleFileNameW
OutputDebugStringW
CreateFileW
LockResource
GetCurrentThread
GetCurrentThreadId
LoadResource
SizeofResource
CreateProcessW
GetCommandLineW
FindResourceW
FindResourceExW
OpenProcess
GetCurrentProcess
GetLastError
ReleaseMutex
Sleep
GetTickCount
CreateMutexW
CreateEventW
LoadLibraryExW
GetCommandLineA
GetEnvironmentVariableW
LocalAlloc
LocalFree
GetCurrentProcessId
TerminateProcess
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WaitForSingleObject
ReadFile
FindClose
GetSystemInfo
LoadLibraryA
GetModuleHandleW
SetEnvironmentVariableW
GetTempPathW
GetFullPathNameW
FindFirstFileW
FindNextFileW
GetVersionExW
QueryPerformanceCounter
IsProcessorFeaturePresent
EncodePointer
LeaveCriticalSection
EnterCriticalSection
IsDebuggerPresent
GetSystemTimeAsFileTime
CloseHandle
GetProcAddress
FreeLibrary
lstrcmpiW
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
DecodePointer
lstrlenW
wsprintfW
MessageBoxW
GetDesktopWindow
GetShellWindow
GetWindowThreadProcessId
FindWindowExW
LookupPrivilegeValueW
GetSidSubAuthorityCount
GetSidSubAuthority
AdjustTokenPrivileges
GetTokenInformation
OpenProcessToken
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
DuplicateTokenEx
CommandLineToArgvW
SHGetFolderPathW
CoUninitialize
CoCreateInstance
StringFromCLSID
CoCreateGuid
CoInitialize
SysFreeString
PathFileExistsW
PathIsRelativeW
StrCpyW
PathStripPathW
PathRemoveFileSpecW
PathAppendW
?_Syserror_map@std@@YAPBDH@Z
??0id@locale@std@@QAE@I@Z
?_Orphan_all@_Container_base0@std@@QAEXXZ
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Xbad_alloc@std@@YAXXZ
?_Winerror_map@std@@YAPBDH@Z
_crt_debugger_hook
__set_app_type
__wgetmainargs
_commode
__crtUnhandledException
_wcmdln
_initterm
_initterm_e
__setusermatherr
_configthreadlocale
__crtTerminateProcess
__crtSetUnhandledExceptionFilter
_invoke_watson
exit
_exit
_controlfp_s
_fmode
??3@YAXPAX@Z
??2@YAPAXI@Z
free
malloc
??_V@YAXPAX@Z
memmove
_wcsdup
_CxxThrowException
__CxxFrameHandler3
memcpy
memset
memcpy_s
memmove_s
wcscpy_s
wcsnlen
wcsstr
_wcsicmp
_wcsupr_s
wmemcpy_s
wcscspn
wcsrchr
__argc
__wargv
_amsg_exit
_purecall
wcstoul
memchr
wcscat_s
wcschr
vswprintf_s
_vscwprintf
memcmp
??1type_info@@UAE@XZ
_lock
_unlock
_calloc_crt
__dllonexit
_onexit
?terminate@@YAXXZ
_except_handler4_common
_XcptFilter
__crtGetShowWindowMode
_cexit
?Set_CrashUploadParams@@YAXHPB_W@Z
GetExternElapseTime
GetStartTickCount
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ