Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
9361bb9302e9fe264f5cfc132dbe0ea1_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9361bb9302e9fe264f5cfc132dbe0ea1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
9361bb9302e9fe264f5cfc132dbe0ea1_JaffaCakes118
Size
1.2MB
MD5
9361bb9302e9fe264f5cfc132dbe0ea1
SHA1
43d6d5b31b916aaf6e6935372c27377bc021b0b3
SHA256
6f162acd7101048e3ab1d53d744200e24f5d38ed1fa1786ca14273af292db5bf
SHA512
4e8ba3abd9fe151596945bd01a9d15d6c8de2af7fdd4f776e0dc856c746a6725c9a934f5b0265a2e4a36b8dc1df5de2068ed716d23ba3d587425b0a9be6a9f68
SSDEEP
24576:i/vXd0GFi/eytAEuJ7qOdrNYdzx2J0cuwKfPuAhYt2iH/6w2pZPvpf7Qg6aE:Yfd0GFi/pAEE7veMgfLhYtvCR3XpTRw
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\Code\1_PCDownloader\PackageTools\product\win32\dbginfo\kpacket.pdb
GetCurrentProcessId
SizeofResource
LockResource
LoadResource
GetTempPathW
CreateFileW
FindResourceExW
GetCurrentProcess
GetFileSize
GetModuleHandleW
TerminateProcess
ExpandEnvironmentStringsW
FindFirstFileW
GetWindowsDirectoryW
lstrcmpW
SetFileAttributesW
GetCurrentDirectoryW
DeleteFileW
MoveFileExW
GetTickCount
GetFileAttributesW
CreateDirectoryW
FindNextFileW
GetLastError
FindClose
SetFilePointer
RemoveDirectoryW
ReadFile
MultiByteToWideChar
GetCommandLineW
WideCharToMultiByte
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
VirtualAlloc
DeleteCriticalSection
SetEvent
InitializeCriticalSection
ReleaseSemaphore
ResetEvent
CreateSemaphoreW
CreateEventW
GetStdHandle
WriteFile
CopyFileW
SetFileTime
MoveFileW
GetTempFileNameW
GetSystemInfo
SystemTimeToFileTime
LocalFileTimeToFileTime
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
CreateFileA
FindResourceW
GetProcAddress
LoadLibraryW
CloseHandle
CreateProcessW
GetSystemDirectoryW
WaitForSingleObject
GetModuleFileNameW
VirtualFree
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
LoadLibraryA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
HeapCreate
GetStringTypeW
RaiseException
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
InterlockedIncrement
InterlockedDecrement
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetCurrentThreadId
CreateThread
GetStartupInfoW
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
ExitProcess
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
UnregisterClassA
CharLowerW
CharUpperW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
CoUninitialize
CoInitialize
SysFreeString
SysAllocString
VariantClear
VariantCopy
PathAddBackslashW
PathRemoveFileSpecW
PathIsDirectoryW
PathAppendW
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ