Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
64f75c4cf4b617658ab1c85a3b75ad29_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
64f75c4cf4b617658ab1c85a3b75ad29_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
64f75c4cf4b617658ab1c85a3b75ad29_JaffaCakes118
Size
1.9MB
MD5
64f75c4cf4b617658ab1c85a3b75ad29
SHA1
5b82f66770f05a017ad0b380e286abc39f656ce9
SHA256
d06a67e5c8e127ce8820e7420d903ac0aeeb88030f25723e6de9b7fdca0b6b01
SHA512
788af96ce17879efb567666d8da1db105dc4f1646c8a7b4b5195f8c28567a8536c10cf7883e23c1a14d0eedaa4ddce562b9ac518b6becf4120d9148179424be6
SSDEEP
49152:70B6orjxTwCW3FP9/S0sVOecqdtxMRFJ0PhFIPKNp844ACuNWZvN3X3INyTcAk2D:UkdHmPMvJaoWJWZtnIY
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Work\NewAllInstaller\AllInstaller.NET\AllInstallerLoader\Release\AllInstallerLoader.pdb
GetTempPathW
CreateFileW
LockResource
CloseHandle
LoadResource
GetModuleFileNameW
SetCurrentDirectoryW
GetProcAddress
GetModuleHandleW
WriteConsoleW
WriteFile
GetCurrentProcess
FindResourceW
SizeofResource
HeapSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
MultiByteToWideChar
GetLastError
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
WideCharToMultiByte
WaitForSingleObjectEx
Sleep
SwitchToThread
GetExitCodeThread
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
EncodePointer
DecodePointer
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
CreateTimerQueue
SetEvent
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualProtect
VirtualFree
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
RtlUnwind
RaiseException
ExitProcess
GetModuleHandleExW
ExitThread
GetStdHandle
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
HeapReAlloc
GetFileSizeEx
SetFilePointerEx
GetTimeZoneInformation
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
wsprintfW
OpenProcessToken
GetTokenInformation
RegGetValueA
ShellExecuteExW
HttpOpenRequestW
HttpSendRequestW
InternetCloseHandle
InternetAttemptConnect
HttpQueryInfoW
InternetConnectW
InternetOpenW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ