Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
5098461a50b9b818fd1c57dc9e9e5485_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5098461a50b9b818fd1c57dc9e9e5485_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
5098461a50b9b818fd1c57dc9e9e5485_JaffaCakes118
Size
90KB
MD5
5098461a50b9b818fd1c57dc9e9e5485
SHA1
50c8c31c82374c27f0881e53a77f5f1451cbbd91
SHA256
b8c63d56be790d9c4368010a34ea4f576b4ae84b2f3f7cefbb1c8b0774b2076a
SHA512
1341cccf9e9c5bbb65fbdd0e164a2895ed35384b6c1bbf0b4c27b55649cb6f00d0b21d1d1f0a7b2ad9cf290258c982651c39f750ca3d63a78328b94836d20053
SSDEEP
1536:5VHC6WnLLCWRQa3GkdKJLD6xUwEWvec/dvxF9aD9CR:5V2Ce/VKVGxiWveYRxFI6
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
C:\DistributedAutoLink\Temp\CompileOutputDir\skinset.pdb
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
GetFileAttributesA
GetFileAttributesW
GetVersion
GetTempPathA
GetProcAddress
GetModuleHandleW
GetTempFileNameA
GetTempFileNameW
SetUnhandledExceptionFilter
WriteFile
lstrlenA
lstrlenW
GetModuleFileNameA
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
VirtualQuery
GlobalMemoryStatus
GetSystemInfo
IsBadReadPtr
LoadLibraryA
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
GetLastError
FreeLibrary
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
SetErrorMode
CloseHandle
CreateFileA
GetCurrentProcessId
GetCurrentProcess
CreateDirectoryA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
QueryPerformanceCounter
GetStartupInfoA
ExitProcess
GetTickCount
EnterCriticalSection
LeaveCriticalSection
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetModuleHandleA
InterlockedExchange
MessageBoxA
wsprintfA
wvsprintfA
DefWindowProcA
CharNextA
DestroyWindow
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegQueryInfoKeyA
RegEnumKeyExA
RegSetValueExA
RegCreateKeyExA
CoTaskMemAlloc
CoTaskMemRealloc
CoUninitialize
CoInitialize
CoTaskMemFree
CoCreateInstance
VarUI4FromStr
InitCommonControlsEx
?_Nomemory@std@@YAXXZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??$?M_WU?$char_traits@_W@std@@V?$allocator@_W@1@@std@@YA_NABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@0@0@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
strncpy
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_controlfp
__set_app_type
__p__fmode
_ismbblead
_XcptFilter
_exit
_c_exit
?terminate@@YAXXZ
_CxxThrowException
_except_handler3
??1exception@@UAE@XZ
??0exception@@QAE@XZ
__CxxFrameHandler
??3@YAXPAX@Z
wcslen
_mbsstr
_mbschr
_mbslwr
_vscprintf
vsprintf
memmove
??0exception@@QAE@ABV0@@Z
free
wcsrchr
strrchr
_onexit
_stricmp
malloc
_resetstkoflw
??_V@YAXPAX@Z
realloc
_itow
_snwprintf
wcsncat
strncat
memset
_callnewh
__security_error_handler
??1type_info@@UAE@XZ
__dllonexit
__p__commode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ