Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
67744b672d43c080c028c489d9501d81_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
67744b672d43c080c028c489d9501d81_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
67744b672d43c080c028c489d9501d81_JaffaCakes118
Size
581KB
MD5
67744b672d43c080c028c489d9501d81
SHA1
fb131fc49b2e24fc4ddcda99292c720d8da69547
SHA256
5c2fb359ae7e12f014b3718655642d786def820a315d332501fa8d7999d9de49
SHA512
f583fb137d0c885cd4e9cee6f2481469faf5633fd9de61506cc387d16b8ec1a786d367a595b2a16410c90676c032e57500cdf3295c086cba82c9c5c3fb92c10d
SSDEEP
3072:OojplkHR5BP8n7FQiaFSsi9TPECI1htiw7VCCZt64kBL0jwlGuPH2GB0ShckTNJT:R9eHR5BEn7u4J9TPEjr7oQkh8Gyalr
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
f:\project_2008\Gdisk_candle_kgrid\Filebus\Bin\CreateShortCut.pdb
URLDownloadToFileA
SHGetSpecialFolderPathA
SetErrorMode
GetFileAttributesA
GetFileTime
HeapFree
VirtualAlloc
HeapAlloc
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
ExitProcess
RaiseException
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
HeapDestroy
HeapCreate
GetOEMCP
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
GetTimeZoneInformation
GetDriveTypeA
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetCPInfo
InterlockedIncrement
GlobalFlags
GetCurrentDirectoryA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedDecrement
GetModuleFileNameW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FormatMessageA
LocalFree
MulDiv
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GlobalGetAtomNameA
GlobalFindAtomA
LoadLibraryA
lstrcmpW
GetVersionExA
GlobalUnlock
GlobalFree
FreeResource
WritePrivateProfileStringA
GetCurrentProcessId
SetLastError
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GetModuleHandleA
GetProcAddress
GetCurrentThreadId
CloseHandle
lstrlenA
CompareStringA
InterlockedExchange
GetLastError
CompareStringW
GetVersion
MultiByteToWideChar
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
VirtualFree
LoadCursorA
GetSysColorBrush
ShowWindow
SetWindowTextA
IsDialogMessageA
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
RemovePropA
SetFocus
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
UnregisterClassA
DestroyMenu
GetPropA
CheckMenuItem
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostMessageA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
CharUpperA
LoadIconA
EnableWindow
DrawIcon
GetClientRect
GetSystemMetrics
SendMessageA
IsIconic
PostQuitMessage
GetSubMenu
DeleteDC
GetStockObject
GetDeviceCaps
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
OffsetViewportOrgEx
GetFileTitleA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
RegQueryValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
InitCommonControlsEx
PathStripToRootA
PathFindExtensionA
PathFindFileNameA
PathIsUNCA
CoInitialize
CoCreateInstance
CoUninitialize
VariantClear
VariantChangeType
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ