Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
884d3ac22c43d231bf69c6df9ce98049_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
884d3ac22c43d231bf69c6df9ce98049_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
884d3ac22c43d231bf69c6df9ce98049_JaffaCakes118
Size
368KB
MD5
884d3ac22c43d231bf69c6df9ce98049
SHA1
02646735d6fc723d86978d23066cb7b6fa15d255
SHA256
4e571e2391dd32333441e2ff399f0f9b1f37ad626041a1c55462fb2eb18d80e7
SHA512
27792beebac35c146742765fc0bca5a21e6c0a145ca0e3f01ad16430506fe5cb64945f359d11c33013f5933e1f2b3e98789735365564390a96aca4f07747b566
SSDEEP
6144:GJwx+zTO02TvEUSzi1G6/InjNx9LtEmCR1/gxKrpU1QUTivtE:GJwx+zTBtzi18xzBEmCRixBivtE
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\clientci\workspace\bdwebadapter_trunk_compile\Basic\Output\BinRelease\BDDownloadExe.pdb
CreateFileW
DeleteFileW
DecodePointer
ReadFile
GetCurrentThreadId
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
ExpandEnvironmentStringsW
QueryPerformanceCounter
GetLocalTime
GetTempPathW
CreateProcessW
CreateEventW
ResetEvent
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
FreeLibrary
GetCurrentProcess
SetUnhandledExceptionFilter
GetModuleHandleExW
GlobalMemoryStatusEx
GetCurrentProcessId
WaitForMultipleObjects
TerminateProcess
GetCommandLineW
CreateToolhelp32Snapshot
Process32FirstW
lstrcmpiW
Process32NextW
GetFileAttributesW
GetVersionExW
SetLastError
SetEvent
GetProcAddress
Sleep
CopyFileW
WideCharToMultiByte
GetFileSize
WriteFile
FindFirstFileW
FindClose
InterlockedDecrement
GlobalFree
InterlockedIncrement
DuplicateHandle
GetSystemDirectoryW
DeviceIoControl
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
OpenProcess
GetModuleHandleW
ProcessIdToSessionId
WTSGetActiveConsoleSessionId
InterlockedExchange
OutputDebugStringW
GetSystemInfo
GetModuleFileNameA
EncodePointer
GetStringTypeW
IsDebuggerPresent
ReadConsoleW
SetStdHandle
SetFilePointerEx
GetTimeZoneInformation
FlushFileBuffers
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
GetConsoleMode
LoadLibraryW
InitializeCriticalSectionAndSpinCount
SetEnvironmentVariableA
RaiseException
MultiByteToWideChar
DeleteCriticalSection
WaitForSingleObject
GetLastError
CloseHandle
WriteConsoleW
SetEndOfFile
GetTickCount
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetFileType
GetStdHandle
GetOEMCP
GetACP
IsValidCodePage
AreFileApisANSI
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
CreateDirectoryW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
CreateThread
ExitThread
LoadLibraryExW
IsProcessorFeaturePresent
FindFirstFileExW
GetDriveTypeW
DispatchMessageW
GetMessageW
IsWindow
FindWindowA
DefWindowProcW
TranslateMessage
PostMessageW
CreateWindowExW
SetWindowLongW
DestroyWindow
SendMessageTimeoutW
RegQueryValueExW
RegDeleteValueW
DuplicateTokenEx
CreateProcessAsUserW
GetTokenInformation
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
RegSetValueExW
RegOpenKeyExW
RegCloseKey
CLSIDFromString
StringFromCLSID
SHCreateDirectoryExW
ord171
ShellExecuteW
ShellExecuteExW
ord165
CommandLineToArgvW
SHGetSpecialFolderPathW
PathAppendW
SHGetValueW
PathRemoveFileSpecW
PathFindFileNameW
SHDeleteKeyW
SHSetValueW
PathFileExistsW
Netbios
WTSQueryUserToken
CreateEnvironmentBlock
DestroyEnvironmentBlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ