Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
093ac0ca0e3fbf689505884c8a50bc47_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
093ac0ca0e3fbf689505884c8a50bc47_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
093ac0ca0e3fbf689505884c8a50bc47_JaffaCakes118
Size
869KB
MD5
093ac0ca0e3fbf689505884c8a50bc47
SHA1
d570e584e88dcefd1505099581181f17fe9a9c99
SHA256
41849686222e48ad4a98a56b8fac18b371abe1129979eced68a4cfc2ab9714d6
SHA512
6a0725956dd03baa074f0cfae099f4e19697c20e397999aa5534ee55061ec0e8f6678901e8f65312814872697729e11f84cd939ec4550f340cde53f3ebb54ce2
SSDEEP
12288:B3g5LNAJQdveHQjPnqxlCmdMy3SptvbQ0ElDEGyjTP:B3gsJQZekPnqxlDd/3B0ElRcz
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Projects\GibMedia\Release\GibMedia.pdb
UuidToStringW
RpcStringFreeW
UuidCreate
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
SetFilePointer
lstrcmpW
CreateMutexW
GetLastError
OpenProcess
GetCurrentProcessId
LocalFree
WriteFile
CreateDirectoryW
GetFileAttributesW
Sleep
TerminateProcess
ExpandEnvironmentStringsW
RemoveDirectoryW
GetModuleHandleW
GetCurrentProcess
UnmapViewOfFile
WaitForSingleObject
GetExitCodeProcess
FindResourceW
LoadResource
LockResource
SizeofResource
GetTickCount
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
RtlUnwind
HeapReAlloc
FreeLibrary
GetProcAddress
LoadLibraryW
MapViewOfFile
CreateFileMappingW
SetDllDirectoryW
DeleteFileW
CopyFileW
CloseHandle
ReadFile
GetFileSize
CreateFileW
GetPrivateProfileStringW
GetEnvironmentVariableW
HeapFree
GetProcessHeap
HeapAlloc
lstrlenW
HeapSize
CreateFileA
FlushFileBuffers
CreateProcessW
VirtualAlloc
InitializeCriticalSectionAndSpinCount
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
LCMapStringW
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SendMessageW
GetWindowThreadProcessId
FindWindowW
EnumWindows
GetClassNameW
ControlService
StartServiceW
QueryServiceStatusEx
OpenServiceW
CloseServiceHandle
OpenSCManagerW
RegEnumKeyW
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
RegEnumValueW
RegCloseKey
RegSetKeySecurity
DeleteAce
GetAce
GetSecurityInfo
RegOpenKeyExW
ConvertSidToStringSidW
IsValidSid
GetTokenInformation
OpenProcessToken
ShellExecuteW
CoUninitialize
CoCreateInstance
CoInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ