Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
87b19ac00f3f7e4d24c79d93ed72661a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
87b19ac00f3f7e4d24c79d93ed72661a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
87b19ac00f3f7e4d24c79d93ed72661a_JaffaCakes118
Size
1.4MB
MD5
87b19ac00f3f7e4d24c79d93ed72661a
SHA1
6719aca67c3f4149df075a024f463bd084124b1b
SHA256
21fbb54a988a7b5be29bb88a37a249710632dd5cc67c8a0a834ff720f1753863
SHA512
6a36b4a348dff5f6125ee045edc01efadf9ffe3bcfb519a574202f93721ce3cb4e193079289f7be9314183fa1c86458b25a6f159612ec4b570122497df281d8d
SSDEEP
24576:7MTbrfVjnSq1Zcr8yFptRrndT71aHmYzoP3cdVfNB3vH2JZTk5JuCyj3Xea2l2p7:7mbrfVjn71Y8G/RrdT7IPcP3sfNB/sTD
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
G:\RuanMei\PCMaster\bin\Release\pcmastertray.pdb
GetLongPathNameW
GetWindowsDirectoryW
GetFullPathNameW
GetTempFileNameW
GetSystemTime
WriteFile
WaitNamedPipeW
DeleteFileA
MoveFileA
GetSystemInfo
CopyFileW
GetCommandLineW
OpenEventW
SetEvent
GetLocalTime
FindNextFileW
FindClose
GetFileSize
FindFirstFileW
SetLastError
CreateProcessW
GetStartupInfoW
MulDiv
SetProcessWorkingSetSize
OpenProcess
HeapAlloc
HeapFree
GetProcessHeap
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetExitCodeThread
CreateThread
ExpandEnvironmentStringsW
CreateEventW
TerminateProcess
lstrlenA
WritePrivateProfileStringW
GetSystemDirectoryW
WinExec
lstrcpyA
GetPrivateProfileStringW
RemoveDirectoryW
GetCurrentProcessId
SetUnhandledExceptionFilter
DeleteFileW
FindNextVolumeA
QueryDosDeviceA
FindFirstVolumeA
GetSystemPowerStatus
GetProcessTimes
OpenMutexW
CancelIo
GetOverlappedResult
lstrcmpiA
GetTickCount
MoveFileW
MoveFileExW
lstrcmpW
CreateFileA
GetFileSizeEx
ReadFile
CreateMutexW
Process32FirstW
Process32NextW
WaitForSingleObject
SuspendThread
IsBadReadPtr
lstrcmpiW
InterlockedDecrement
InterlockedIncrement
WTSGetActiveConsoleSessionId
GetCurrentThreadId
Sleep
DeviceIoControl
lstrcpynW
lstrcmpA
LocalAlloc
LoadLibraryW
VirtualProtect
WriteProcessMemory
CreateFileW
GetFileTime
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
lstrcpyW
CloseHandle
GetVersionExW
LocalFree
FileTimeToLocalFileTime
GetModuleHandleW
GetProcAddress
GetCurrentProcess
FlushInstructionCache
InitializeCriticalSectionAndSpinCount
RaiseException
GetModuleFileNameW
GetTempPathW
GetCurrentDirectoryW
CreateDirectoryW
GetFileAttributesW
FreeResource
GlobalAlloc
GlobalLock
GlobalFree
GlobalUnlock
lstrlenW
EnterCriticalSection
LeaveCriticalSection
InterlockedExchange
QueryPerformanceFrequency
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
GetSystemTimeAsFileTime
QueryPerformanceCounter
LoadLibraryExW
LoadLibraryExA
FreeLibrary
BeginUpdateResourceW
BeginUpdateResourceA
EndUpdateResourceW
UpdateResourceW
GetLastError
IsBadCodePtr
FileTimeToDosDateTime
GetVolumePathNamesForVolumeNameA
SetEnvironmentVariableA
CompareStringW
SetEndOfFile
GetFullPathNameA
GetDriveTypeW
SetCurrentDirectoryW
WriteConsoleW
SetConsoleCtrlHandler
SetStdHandle
GetEnvironmentStringsW
SizeofResource
FreeEnvironmentStringsW
FlushFileBuffers
GetTimeZoneInformation
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
FatalAppExitA
ExitProcess
HeapCreate
LCMapStringW
SetFileAttributesW
DeleteCriticalSection
InitializeCriticalSection
WideCharToMultiByte
MultiByteToWideChar
FindResourceExW
FindResourceW
LoadLibraryA
HeapDestroy
HeapReAlloc
HeapSize
InterlockedCompareExchange
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
SetFilePointer
LoadResource
LockResource
GetComputerNameW
InterlockedPushEntrySList
IsProcessorFeaturePresent
VirtualFree
GetFileType
SetHandleCount
GetLocaleInfoW
GetStdHandle
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
UnhandledExceptionFilter
HeapSetInformation
ResumeThread
ExitThread
GetDateFormatW
GetTimeFormatW
VirtualQuery
EncodePointer
DecodePointer
RtlUnwind
InterlockedPopEntrySList
VirtualAlloc
FillRgn
GetStockObject
CreateSolidBrush
GetDeviceCaps
CreateCompatibleBitmap
CreateRoundRectRgn
CombineRgn
GetClipBox
CreateRectRgnIndirect
ExtSelectClipRgn
SelectClipRgn
CreateDIBSection
GetObjectW
StretchBlt
CreateFontIndirectW
BitBlt
GetBitmapBits
SetTextColor
SetBkMode
SetStretchBltMode
DeleteObject
GetDIBColorTable
SelectObject
DeleteDC
CreateCompatibleDC
SetDIBColorTable
BuildExplicitAccessWithNameW
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
SetEntriesInAclW
CreateWellKnownSid
InitializeSecurityDescriptor
AdjustTokenPrivileges
LookupPrivilegeValueW
FreeSid
InitiateSystemShutdownW
RegEnumValueW
DuplicateTokenEx
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
GetServiceKeyNameW
QueryServiceStatus
ControlService
OpenSCManagerW
OpenServiceW
CloseServiceHandle
QueryServiceConfigW
ChangeServiceConfigW
StartServiceW
GetNamedSecurityInfoW
SetSecurityDescriptorDacl
DeleteAce
GetUserNameW
RegFlushKey
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
GetTokenInformation
CreateProcessAsUserW
AllocateAndInitializeSid
SetNamedSecurityInfoW
OpenProcessToken
SHGetMalloc
CommandLineToArgvW
SHGetFolderPathW
Shell_NotifyIconW
ShellExecuteW
ShellExecuteExW
CoTaskMemFree
CreateStreamOnHGlobal
StringFromCLSID
OleUninitialize
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoInitialize
CoUninitialize
CoSetProxyBlanket
CoInitializeEx
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoInitializeSecurity
LoadRegTypeLi
OleCreateFontIndirect
VariantInit
SysStringLen
VariantClear
LoadTypeLi
SysAllocString
SysAllocStringLen
SysFreeString
CreateErrorInfo
GetErrorInfo
VariantChangeType
SetErrorInfo
DispCallFunc
VarUI4FromStr
StrStrIA
PathFileExistsW
PathFindFileNameW
PathAppendW
PathFileExistsA
PathFindExtensionW
InitCommonControlsEx
_TrackMouseEvent
AlphaBlend
TransparentBlt
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
CreateEnvironmentBlock
WTSQueryUserToken
GetModuleFileNameExW
EnumProcessModules
SetSuspendState
IsPwrHibernateAllowed
GetPwrCapabilities
InternetGetCookieW
InternetGetCookieExW
HttpSendRequestW
InternetSetCookieW
HttpQueryInfoW
InternetReadFile
InternetSetOptionW
InternetOpenUrlW
GetUrlCacheEntryInfoW
InternetCloseHandle
InternetCheckConnectionW
HttpEndRequestW
InternetWriteFile
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpSendRequestExW
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipCloneBrush
GdipCreateFontFromLogfontW
GdipCreateFontFromDC
GdipDrawString
GdipSetTextRenderingHint
GdipGetImagePalette
GdipCreateBitmapFromStream
GdipDeleteGraphics
GdipAlloc
GdipFree
GdipSetStringFormatTrimming
GdipCreateSolidFill
GdipDeleteFont
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageHeight
GdipCreateStringFormat
GdipDeleteBrush
GdipDrawImagePointRectI
GdipReleaseDC
GdipCreateFromHDC
GdipDrawImageRectI
GdipSetSmoothingMode
GdipSetInterpolationMode
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipCreateHICONFromBitmap
GdipSaveImageToStream
GdipLoadImageFromFileICM
GdipLoadImageFromFile
GdipCreateHBITMAPFromBitmap
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipDrawImageRectRectI
GdipSetImageAttributesWrapMode
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipGetImageWidth
GdipDeleteStringFormat
GdipCreateImageAttributes
GdipCloneImage
GdipDrawImageI
GdipGetImageGraphicsContext
GdiplusShutdown
GdiplusStartup
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStreamICM
GdipDisposeImage
MprConfigServerConnect
MprConfigGetFriendlyName
GetInterfaceInfo
GetNetworkParams
GetAdaptersInfo
GetPerAdapterInfo
WinHttpConnect
WinHttpSendRequest
WinHttpOpenRequest
WinHttpOpen
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpSetTimeouts
timeBeginPeriod
timeGetTime
timeEndPeriod
PdhOpenQueryW
PdhAddCounterW
PdhCloseQuery
PdhGetFormattedCounterValue
PdhRemoveCounter
PdhCollectQueryData
URLDownloadToFileW
MiniDumpWriteDump
CryptQueryObject
CryptMsgGetParam
CryptDecodeObject
CertFindCertificateInStore
CertGetNameStringW
WinVerifyTrust
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ