Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
lnkkiller/lnkkiller.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
lnkkiller/lnkkiller.exe
Resource
win10v2004-20240508-en
Target
7ab662a68b32182af0a4159acc48ac6d_JaffaCakes118
Size
168KB
MD5
7ab662a68b32182af0a4159acc48ac6d
SHA1
62cba49d8e7bdf11178e884e53e4c86c852de39b
SHA256
43e7a4dc22adb6d58b38a0418f07a14830eb193b7d4f5ddc4f1d44c5c9fc39ee
SHA512
c5c1005f61db2fd64f3b59559d8566dda295bde30f3f04e9731badb43e541aefe267c85fd6e415f28cf16fa7c2edf8b3318e21b29fb19dd6aa38af4bbb3d237d
SSDEEP
3072:8y3CA710eFZAX129hDpGr6yspe7UBMmIcsG/PNYBdZ2X8O8FbhVNno3gFuGDO/F:nZOiWr6ys/6mxsUPih60MHGa/F
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\workspace\daily_build\b3a\trunk\src\OneShotOneKill\Stub\ReleaseKN\lnkkiller.pdb
GetLogicalDriveStringsW
GetDriveTypeW
RemoveDirectoryW
GetWindowsDirectoryW
lstrcpyW
MoveFileW
GetSystemDefaultUILanguage
GetCurrentDirectoryW
CreateFileW
SetFilePointer
WriteFile
FlushFileBuffers
GetFileSize
ReadFile
CopyFileW
CreateDirectoryW
GetSystemDirectoryW
GetEnvironmentVariableW
GetLongPathNameW
GetFileAttributesExW
Module32FirstW
LoadLibraryW
GetProcAddress
SetEndOfFile
FreeResource
SetEnvironmentVariableA
CompareStringW
CompareStringA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetTimeZoneInformation
GetLocaleInfoW
GetConsoleMode
GetConsoleCP
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
SetConsoleCtrlHandler
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
FindNextFileW
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCurrentThread
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
ExitProcess
MoveFileExW
lstrcmpW
Process32NextW
CloseHandle
GetVersionExW
GetPrivateProfileStringW
GetVersion
Process32FirstW
CreateToolhelp32Snapshot
LocalFree
Sleep
TerminateProcess
FindFirstFileW
OpenProcess
WideCharToMultiByte
GetLocalTime
DeleteFileW
SetFileAttributesW
InterlockedDecrement
FindResourceExW
lstrcpynW
TerminateThread
LockResource
WaitForSingleObject
lstrlenA
GetFileAttributesW
lstrcatW
GetCurrentThreadId
InitializeCriticalSection
InterlockedIncrement
SetLastError
SetErrorMode
DeleteCriticalSection
FlushInstructionCache
GetCurrentProcess
lstrcmpiW
FreeLibrary
GetModuleFileNameW
LoadLibraryExW
EnterCriticalSection
FindResourceW
LoadResource
SizeofResource
GetModuleHandleW
RaiseException
lstrlenW
GetLastError
GetModuleHandleA
HeapCreate
FatalAppExitA
RtlUnwind
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateThread
ExitThread
HeapSize
HeapReAlloc
HeapDestroy
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
GetTempPathW
FindClose
LeaveCriticalSection
MultiByteToWideChar
QueryPerformanceCounter
InflateRect
BeginPaint
LoadBitmapW
GetWindowLongW
EndDialog
DialogBoxParamW
CharNextW
DestroyWindow
SetWindowLongW
GetActiveWindow
DefWindowProcW
wsprintfA
DestroyIcon
GetIconInfo
IsCharAlphaNumericW
wsprintfW
LoadCursorW
DrawIcon
SetCursor
CallWindowProcW
GetSysColor
DrawTextW
GetDlgCtrlID
SendMessageW
GetSystemMetrics
ReleaseCapture
GetDlgItem
SetCapture
SetWindowTextW
InvalidateRect
GetWindow
SystemParametersInfoW
ReleaseDC
GetWindowRect
GetParent
GetClientRect
MapWindowPoints
GetWindowTextLengthW
SetWindowPos
MessageBoxW
PostMessageW
GetDC
EndPaint
LoadImageW
GetWindowTextW
UnregisterClassA
LineTo
MoveToEx
SetBkMode
CreateFontIndirectW
GetStockObject
GetObjectW
SetTextColor
CreateBitmap
CreateDIBSection
StretchBlt
BitBlt
DeleteDC
ExtTextOutW
SetBkColor
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
DeleteObject
GetDIBits
GetSidSubAuthority
RegDeleteValueW
RegSetValueExW
RegOpenKeyW
RegEnumValueW
OpenProcessToken
IsValidSid
GetLengthSid
SetNamedSecurityInfoW
GetNamedSecurityInfoW
AdjustTokenPrivileges
GetAce
RegQueryValueExW
CopySid
RegOpenKeyExW
GetAclInformation
InitializeSid
AddAce
GetSidLengthRequired
InitializeAcl
LookupPrivilegeValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
RegCreateKeyExW
SHGetFolderPathW
ord59
SHGetSettings
ExtractIconW
SHGetFileInfoW
SHFileOperationW
CommandLineToArgvW
SHChangeNotify
ShellExecuteW
SHGetSpecialFolderPathW
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoInitialize
CoUninitialize
CoCreateInstance
VarUI4FromStr
SysFreeString
StrStrIW
StrRChrW
StrChrA
StrChrW
PathRemoveFileSpecW
SHGetValueW
SHSetValueW
StrStrIA
_TrackMouseEvent
InitCommonControlsEx
InternetGetConnectedState
URLDownloadToFileW
GetModuleFileNameExW
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ