Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
7b7d3f0c527b0c7d295fcc0e24cde46e_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7b7d3f0c527b0c7d295fcc0e24cde46e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
7b7d3f0c527b0c7d295fcc0e24cde46e_JaffaCakes118
Size
1.6MB
MD5
7b7d3f0c527b0c7d295fcc0e24cde46e
SHA1
28ab2605921a80e057dfdca393525f80e3bdca20
SHA256
264963b38c05139cb5727acf3be86ba294bf7fd98b5aefaf39c6216b02ff559c
SHA512
1f08f687d9299d76cbe38e07a26616f9eea1e64fe017e414335a1be9d373583704946d2f29f3a7f7068a09801a2c32b7efe27a44842d09434d17153203181b83
SSDEEP
24576:AVWwV7HmCjg1JSubPr+R/yVpxS0iPbuQj3evRt:AVxBHmCjg1JLPr+R/VTuQjuvRt
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\builds\33\Search Protector\SP-2.9.0-Production\Sources\SearchProtector\Dev\2.9.0\Output\Release_64\SPtool64.pdb
EnumProcessModules
GetModuleBaseNameW
CertGetNameStringW
CryptMsgClose
CryptQueryObject
CryptMsgGetParam
CertFindCertificateInStore
CertFreeCertificateContext
CertCloseStore
SetFilePointer
WideCharToMultiByte
WriteFile
ReleaseMutex
GetSystemTimeAsFileTime
GetCurrentThreadId
Sleep
ReadFile
GetFileAttributesW
CreateDirectoryW
LocalAlloc
LocalFree
MultiByteToWideChar
LoadLibraryW
FreeLibrary
GetCurrentProcess
GetModuleHandleExW
GetVersionExW
GetUserDefaultLCID
GetLocaleInfoW
GetSystemInfo
TerminateProcess
LoadLibraryA
IsDebuggerPresent
GetStringTypeW
EncodePointer
GetExitCodeThread
HeapFree
GetCommandLineW
HeapReAlloc
LoadLibraryExW
HeapAlloc
GetCPInfo
IsProcessorFeaturePresent
RtlPcToFileHeader
CreateFileW
RtlLookupFunctionEntry
RtlUnwindEx
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsFree
GetStartupInfoW
GetDateFormatW
SetConsoleMode
CompareStringW
LCMapStringW
IsValidLocale
EnumSystemLocalesW
GetProcessHeap
ExitProcess
AreFileApisANSI
HeapSize
GetStdHandle
GetFileType
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetACP
GetOEMCP
SetConsoleCtrlHandler
GetTimeZoneInformation
OutputDebugStringW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetStdHandle
WriteConsoleW
FlushFileBuffers
SetEnvironmentVariableA
SetEndOfFile
DeviceIoControl
GetModuleHandleA
FormatMessageA
MoveFileExW
GetFileAttributesExW
GetLastError
CreateMutexW
TlsAlloc
GetModuleFileNameW
GetCurrentProcessId
FlushConsoleInputBuffer
GlobalMemoryStatus
GetTickCount
GetVersion
ReadConsoleW
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleW
WriteProcessMemory
VirtualAllocEx
OpenProcess
TlsGetValue
TlsSetValue
SetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
TryEnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateProcessW
CloseHandle
RaiseException
VirtualFreeEx
ReadConsoleInputA
DecodePointer
GetTimeFormatW
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
GetDesktopWindow
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SHGetFolderPathW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ