Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
a7610ae2418952f5937cc5055ee5390e_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a7610ae2418952f5937cc5055ee5390e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
a7610ae2418952f5937cc5055ee5390e_JaffaCakes118
Size
297KB
MD5
a7610ae2418952f5937cc5055ee5390e
SHA1
d8eeb0e32f57d15bd9c9c19fed223fafc26a2c49
SHA256
06ad56bb4459328ed17d795dc9daae14d4f2df8bb4f462f8e6c397a70e457fc8
SHA512
7dd6964fc65c20630a4b048ecdd6619369ffa4cd08e5af282edb563ea7c217ff13f9c108441d91f198205c48333eda2a549dc566adf76374c6edf1e3bfa3eb79
SSDEEP
3072:LkfLGE9NXQsvZe7XDO9Wzoi0CqahTypt5Zi04Gy8lJfkgUYBMd:ILGE/1vcTO9koi0CKby8/9Be
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
G:\LT\Release\trippc.pdb
LoadLibraryA
OpenProcess
TerminateProcess
GetFileAttributesA
CreateEventA
WTSGetActiveConsoleSessionId
CreateToolhelp32Snapshot
GetVersionExA
ProcessIdToSessionId
Process32Next
GetCPInfo
GetOEMCP
IsValidCodePage
GetProcessHeap
CreateFileW
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
FreeLibrary
GetModuleFileNameA
WaitForSingleObject
SetEvent
DeleteFileA
CloseHandle
FindResourceExW
FindResourceW
SizeofResource
LockResource
LoadResource
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
DecodePointer
GetProcAddress
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
Process32First
InterlockedDecrement
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
MoveFileExW
FindNextFileA
FindFirstFileExA
LCMapStringW
FindClose
GetFileType
SetEnvironmentVariableA
FreeEnvironmentStringsW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
LocalFree
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleFileNameW
SetLastError
RtlUnwind
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
GetStringTypeW
CompareStringW
GetEnvironmentStringsW
CreateProcessAsUserA
AdjustTokenPrivileges
SetTokenInformation
DuplicateTokenEx
LookupPrivilegeValueA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
RegisterServiceCtrlHandlerA
RegEnumValueA
DeleteService
ControlService
StartServiceA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
SetServiceStatus
StartServiceCtrlDispatcherA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
SystemFunction036
RevertToSelf
SHGetSpecialFolderPathA
CoUninitialize
CoInitialize
CoInitializeSecurity
CoCreateInstance
VariantClear
VariantInit
SysAllocString
SysFreeString
WTSQueryUserToken
CreateEnvironmentBlock
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetQueryDataAvailable
InternetReadFile
InternetCloseHandle
InternetOpenA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ