Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
90dbd2b09db1ede56afba548bc284be2_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
90dbd2b09db1ede56afba548bc284be2_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
90dbd2b09db1ede56afba548bc284be2_JaffaCakes118
Size
714KB
MD5
90dbd2b09db1ede56afba548bc284be2
SHA1
3d7028d4d52895e32d2fa6e5ac751e8869317007
SHA256
a382ad21a18831d8a50f02b949951abee314d1197e9389710ae96034ad12d597
SHA512
f3fffab9ffb70b37b4e39e84f276e1aa791b2fd02c26e9637abab950ae5688f788b024aa0df1ff26d015d24f9826a87a3fbc0812cf220a5d73db2c3ef59e020c
SSDEEP
12288:3VmV+thcefuRBkNIn3mHoHfwYi8gS+VvxuiITVDYZcpA7pKUV1CnrstqaWc:l4+7c5c58ClAEpLCIttZ
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\svnroot\kuaizip\trunk\bin\Release\X86\KzUpdateAgency.pdb
LoadLibraryW
GetModuleHandleExW
GetModuleFileNameW
ExpandEnvironmentStringsA
LoadLibraryA
GetProcAddress
FreeLibrary
GetStdHandle
GetFileType
WaitForMultipleObjects
PeekNamedPipe
ReadFile
VerSetConditionMask
VerifyVersionInfoA
SleepEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
Sleep
GetLastError
FormatMessageA
SetLastError
GetTickCount
CloseHandle
CreateProcessA
GetExitCodeProcess
WaitForSingleObject
lstrcmpiA
GetTempFileNameA
GetTempPathA
Process32NextW
Process32FirstW
GetProcessHeap
SetEndOfFile
CreateFileW
SetEnvironmentVariableA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
GetTimeZoneInformation
GetStringTypeA
IsValidLocale
WideCharToMultiByte
MultiByteToWideChar
Process32First
Process32Next
CreateToolhelp32Snapshot
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InterlockedCompareExchange
GetLocaleInfoA
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
HeapReAlloc
HeapAlloc
GetSystemTimeAsFileTime
ExitThread
GetCurrentThreadId
CreateThread
GetCurrentProcessId
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
SetFilePointer
FindClose
GetDriveTypeA
FindFirstFileA
RtlUnwind
GetModuleHandleW
ExitProcess
RaiseException
LCMapStringA
LCMapStringW
GetCPInfo
CompareStringA
CompareStringW
GetTimeFormatA
GetDateFormatA
GetStringTypeW
WriteFile
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapCreate
VirtualFree
VirtualAlloc
SetHandleCount
GetStartupInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetModuleHandleA
SetStdHandle
GetFullPathNameA
GetCurrentDirectoryA
HeapSize
InitializeCriticalSectionAndSpinCount
GetUserDefaultLCID
EnumSystemLocalesA
RegCreateKeyExA
RegOpenKeyExA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
OpenSCManagerA
RegOpenCurrentUser
RegOpenKeyExW
RegCloseKey
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptAcquireContextA
CryptImportKey
CryptReleaseContext
CryptEncrypt
CryptDestroyKey
RegQueryValueExA
SHGetSpecialFolderPathA
StrStrIA
PathRemoveExtensionA
PathAddExtensionA
PathFileExistsW
PathFileExistsA
getsockname
setsockopt
WSAIoctl
ntohs
bind
htons
getsockopt
getpeername
closesocket
send
recv
select
WSAGetLastError
__WSAFDIsSet
WSASetLastError
WSAStartup
WSACleanup
gethostname
ioctlsocket
socket
connect
freeaddrinfo
getaddrinfo
sendto
recvfrom
accept
listen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ