Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
b44550516d2fadb3afbc152190e76192_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b44550516d2fadb3afbc152190e76192_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Target
b44550516d2fadb3afbc152190e76192_JaffaCakes118
Size
695KB
MD5
b44550516d2fadb3afbc152190e76192
SHA1
4af9fddafd9966603d2d0c05392fabfc319af2ab
SHA256
43eb51a55c16b9ec704a0d730f17c5a9392e3726a6c13a01f29a6eafb6f3fbc6
SHA512
d6062f032f4e04efd9c92ca77605f1780101a57ada30c685bbf5bcc00151b11b6e6b95f1e4c23b29e2fd0b042dc6d6904140bf07039c601e362cf99d0245b2ca
SSDEEP
12288:gugZhdwT1265SLqe6qP1f7f+sxwupxHAkHTqtuFSHgRYxK:Fgvdwv5SLqe6qP1f7fwkzqwFSARYxK
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\project\durain\out\win32\pdb\replace.pdb
LoadResource
FindResourceW
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
WideCharToMultiByte
GetModuleFileNameW
GetFileAttributesW
CreateDirectoryW
FindFirstFileW
FindNextFileW
FindClose
GetVersionExW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleW
CreateFileW
ReadFile
CloseHandle
WriteFile
SetEndOfFile
FindResourceExW
EnterCriticalSection
WaitForMultipleObjects
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
CreateEventW
Sleep
SetEvent
TerminateThread
DeleteFileA
GetFileSizeEx
SetLastError
GetCommandLineW
OpenEventW
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
LoadLibraryW
GetLocalTime
LocalFree
MoveFileExW
GetTickCount
GetComputerNameA
WriteConsoleW
SetStdHandle
RaiseException
HeapReAlloc
LockResource
GetLastError
MultiByteToWideChar
HeapSize
InitializeCriticalSectionAndSpinCount
HeapFree
InterlockedCompareExchange
SizeofResource
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
ReadConsoleW
FindFirstFileExW
GetTimeZoneInformation
SetFilePointerEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetConsoleMode
IsDebuggerPresent
OutputDebugStringW
GetStringTypeW
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
AreFileApisANSI
FormatMessageA
RtlUnwind
FreeLibrary
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
ExitProcess
GetStdHandle
GetACP
GetFileType
FlushFileBuffers
GetConsoleCP
RegSetValueExW
OpenProcessToken
RegOpenKeyExW
GetTokenInformation
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
IsValidSid
ord680
CoCreateGuid
PathFileExistsA
PathFileExistsW
StrToIntW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
HttpQueryInfoA
HttpOpenRequestA
InternetCrackUrlA
InternetReadFileExA
InternetConnectA
InternetOpenA
InternetCloseHandle
HttpSendRequestA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ