Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
6a2ee07a3bc7715183d4e0c37aff2a01_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6a2ee07a3bc7715183d4e0c37aff2a01_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
6a2ee07a3bc7715183d4e0c37aff2a01_JaffaCakes118
Size
675KB
MD5
6a2ee07a3bc7715183d4e0c37aff2a01
SHA1
836faf3cdcc458de0e6b9cf6e0694dd6ece51e84
SHA256
1e031aac224de39bf5f80f8cc52467d482968289caeee82f8c2dc89dcb0c8a89
SHA512
1f5a9abcca69526e740dab5589a05178381430943c047bc7a379106d84b1a26f21bbbb24c4f892d8a3c5c1974a69428d95b5e0a9c6117adab9bab845e7fa0c91
SSDEEP
12288:QDjmHdxxA9flfw4uuQUZEpL6uMwqrHhg7WdYY/Lufh+jM1yAOhJZ4:Qnp9flfw4uupepPMwmHq7WqY/6s/AOv6
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\XL_Work\code_svn\xl_client\xl8_client_setup\pdb\Product_Release\ThunderUnistall.pdb
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ImmDisableIME
GetAdaptersInfo
FlushInstructionCache
GetCurrentProcess
CreateMutexW
CloseHandle
OpenMutexW
InterlockedExchange
InterlockedCompareExchange
GetFileSizeEx
CreateFileW
GetDiskFreeSpaceExW
ExitProcess
lstrlenW
SetLastError
lstrlenA
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcatW
lstrcpyW
GetPrivateProfileStringW
DeleteFileW
GetLastError
Sleep
CreateEventW
WaitForMultipleObjects
TerminateThread
WaitForSingleObject
CreateThread
WritePrivateProfileStringW
FindClose
FindNextFileW
FindFirstFileW
RemoveDirectoryW
GetCPInfoExW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetVersionExW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
MoveFileExW
WriteFile
SetFilePointer
GetFileSize
GetCurrentThread
OpenProcess
GetCurrentProcessId
CreateProcessW
LocalFree
GetStartupInfoW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetLocalTime
ResumeThread
OpenFileMappingW
CreateFileMappingW
OpenEventW
LeaveCriticalSection
GetTickCount
MapViewOfFile
VirtualQuery
IsBadCodePtr
GetFileAttributesW
WritePrivateProfileStringA
GetPrivateProfileStringA
GetVolumeInformationA
GetSystemDirectoryA
GetModuleFileNameA
lstrcatA
CreateDirectoryA
GetFileAttributesA
lstrcpyA
DeviceIoControl
CreateFileA
SetPriorityClass
GetVersionExA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
QueryPerformanceCounter
HeapCreate
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetACP
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
GetStdHandle
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCPInfo
LCMapStringW
LCMapStringA
GetModuleFileNameW
GetTempPathW
SetEvent
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
GetModuleHandleW
CopyFileW
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetSystemDirectoryW
WideCharToMultiByte
EnterCriticalSection
ResetEvent
MultiByteToWideChar
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
TerminateProcess
GetUserDefaultLCID
GetSystemTimeAsFileTime
ExitThread
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapSize
HeapReAlloc
HeapDestroy
FlushFileBuffers
SetStdHandle
GetLocaleInfoW
GetConsoleMode
GetConsoleCP
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
LoadLibraryA
LocalAlloc
EnumSystemLocalesA
IsValidLocale
PostQuitMessage
LoadStringW
FindWindowW
wsprintfW
UnregisterClassA
CallWindowProcW
GetWindowLongW
CreateWindowExW
RegisterClassExW
DestroyWindow
GetSystemMetrics
LoadImageW
GetClassInfoExW
IsWindow
SendMessageW
ShowWindow
SetWindowLongW
DefWindowProcW
PostThreadMessageW
TranslateMessage
DispatchMessageW
GetMessageW
PeekMessageW
LoadCursorW
GetDesktopWindow
GetNamedSecurityInfoW
GetAce
GetAclInformation
AddAce
InitializeAcl
EqualSid
IsValidSid
CopySid
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
CreateProcessAsUserW
OpenThreadToken
OpenProcessToken
DuplicateTokenEx
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
SetNamedSecurityInfoW
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
SHCreateDirectoryExW
SHGetFolderPathW
ShellExecuteExW
CommandLineToArgvW
ShellExecuteW
CoCreateInstance
CoInitialize
CoTaskMemFree
OleInitialize
CoUninitialize
VariantClear
SysFreeString
SysAllocString
StrCmpIW
PathIsSameRootW
PathAppendW
PathRemoveFileSpecW
PathFindFileNameW
SHDeleteValueW
SHDeleteKeyW
SHGetValueW
SHSetValueW
StrCmpW
StrCpyNW
PathIsDirectoryW
PathCombineW
PathFileExistsW
UnloadUserProfile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ