Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
6df772bef11f3367818b767c2d0566a1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6df772bef11f3367818b767c2d0566a1_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
6df772bef11f3367818b767c2d0566a1_JaffaCakes118
Size
1.1MB
MD5
6df772bef11f3367818b767c2d0566a1
SHA1
d7a2f6f743f4b65ae199d0e1b0eb47c24e337783
SHA256
15dcc21a9c1baf14716d63b3ffcdc7e661b02d429f6709c3fbed3e9c1700cf35
SHA512
3a8c85da8810858390e2a02742588605e31c331f3bf7cfb8f629d7ccd21632b23b7cc7088ba2db80707e69b8cbb6e2345b77c6b133fa248f1f0177d362267fab
SSDEEP
24576:AoEHSCfaBNOQSf0RhsTsyPzlja2f1m7uJA:ApnaBNOQSjsyPZjB1mSJ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\b\build\slave\win64\build\src\out\Release_x64\setup.exe.pdb
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
ntohl
timeGetTime
UrlCanonicalizeW
SHStrDupW
GetSidSubAuthority
GetSidSubAuthorityCount
RegEnumValueA
SystemFunction036
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
ConvertSidToStringSidW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegLoadKeyW
RegUnLoadKeyW
GetUserNameW
RegQueryValueExW
RegSetValueExW
GetFileSecurityW
SetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSecurityDescriptorToStringSecurityDescriptorW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegOpenKeyExW
RegCloseKey
CreateProcessAsUserW
GetTokenInformation
EnumSystemLocalesW
HeapSize
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetACP
GetOEMCP
GetTimeZoneInformation
WriteConsoleW
ReadConsoleW
OutputDebugStringW
GetDriveTypeW
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
GetCurrentProcess
GetModuleFileNameW
ExpandEnvironmentStringsW
CloseHandle
QueueUserAPC
TerminateProcess
ResumeThread
CreateProcessW
SetPriorityClass
GetPriorityClass
VirtualAllocEx
WriteProcessMemory
GetModuleHandleW
WaitForSingleObject
OpenProcess
GetFileInformationByHandle
GetExitCodeProcess
GetDateFormatW
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadResource
LockResource
SizeofResource
FindResourceW
CreateFileW
ReadFile
SetFilePointer
SetFileTime
WriteFile
VerSetConditionMask
GetShortPathNameW
VerifyVersionInfoW
GetFileAttributesW
GetFileAttributesExW
MoveFileExW
DuplicateHandle
GetCurrentThreadId
RemoveDirectoryW
GetSystemTimeAsFileTime
LocalFree
WTSGetActiveConsoleSessionId
LoadLibraryExW
CreateMutexW
GetTickCount
FormatMessageA
SetLastError
OutputDebugStringA
ReleaseMutex
DeleteFileW
GetCurrentProcessId
GetTempFileNameW
MapViewOfFile
UnmapViewOfFile
CreateDirectoryW
CopyFileW
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
CreateFileMappingW
SetEnvironmentVariableA
SetFileAttributesW
IsDebuggerPresent
GetNativeSystemInfo
GetVersionExW
GetCommandLineW
GetModuleHandleA
GetUserDefaultLangID
SetHandleInformation
GetHandleInformation
AssignProcessToJobObject
GetStdHandle
GetEnvironmentVariableW
FindFirstFileW
FindFirstFileExW
FindClose
FindNextFileW
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
GetFileSizeEx
SetEnvironmentVariableW
QueryPerformanceCounter
FileTimeToSystemTime
QueryPerformanceFrequency
RtlCaptureStackBackTrace
GetLocaleInfoW
GetUserDefaultUILanguage
CreateThread
LeaveCriticalSection
EnterCriticalSection
GetProcessId
GetSystemDirectoryW
GetWindowsDirectoryW
GetModuleHandleExW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetEvent
ResetEvent
WaitForMultipleObjects
RtlCaptureContext
SetUnhandledExceptionFilter
InitializeCriticalSection
ReleaseSemaphore
VirtualQueryEx
CreateSemaphoreW
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
RtlVirtualUnwind
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
GetStartupInfoW
UnhandledExceptionFilter
GetCPInfo
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
PeekNamedPipe
FileTimeToLocalFileTime
HeapReAlloc
GetProcessHeap
HeapAlloc
ExitProcess
GetFileType
SetStdHandle
GetFullPathNameW
GetConsoleMode
GetConsoleCP
HeapFree
IsProcessorFeaturePresent
GetStringTypeW
MultiByteToWideChar
EncodePointer
WideCharToMultiByte
LoadLibraryExA
SetCurrentDirectoryW
Sleep
PropVariantClear
CoSetProxyBlanket
CoCreateInstance
CLSIDFromString
CoUninitialize
CoAllowSetForegroundWindow
CoInitializeEx
CoTaskMemFree
StringFromGUID2
CoCreateGuid
SysFreeString
VariantInit
SysStringLen
SysAllocString
VariantClear
LoadStringW
GetMonitorInfoW
MonitorFromWindow
SetForegroundWindow
MoveWindow
DestroyWindow
CreateWindowExW
GetWindowThreadProcessId
FindWindowW
IsWindow
SendMessageTimeoutW
MessageBoxW
CharUpperW
LoadIconW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
SetWindowLongPtrW
GetWindowLongPtrW
SendMessageW
CreateURLMonikerEx
WTSQueryUserToken
DestroyEnvironmentBlock
CreateEnvironmentBlock
GetHandleVerifier
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ