Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
0d4ca8b71293b6f1b1553b3b146c24a3_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0d4ca8b71293b6f1b1553b3b146c24a3_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Target
0d4ca8b71293b6f1b1553b3b146c24a3_JaffaCakes118
Size
1.2MB
MD5
0d4ca8b71293b6f1b1553b3b146c24a3
SHA1
5e588264b04a1cdc3f60e07e94ef2f510356f2b4
SHA256
9c9fc0af0fde74807e24f1ae184b2579bf1103b84761be2a9bf34201110fbddb
SHA512
a45ab92289231c965948e59a143bcb7d1d758980ace1098cfac7434c87fa68ca16256b87ee9d0a42f3b4cd1c43dc0e95a444854cf4b78fdb57edf141edf7960c
SSDEEP
24576:BH8r7gacALcRj1PcIoI9JjIm3UMAt1D1EQoVsx5dHTUxX:BHC8d9c7gjlzAtd1EQmsxDkX
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\imvent\Develop\client\vc\SearchHelperApp\DisableProtectorsTool\output\release\SimBoInitiatorApp.pdb
GetModuleFileNameW
DeleteFileW
MoveFileW
GetTempPathW
GetLocalTime
GetCurrentProcessId
GetFileAttributesW
CloseHandle
CreateFileW
GetLastError
WriteFile
ReadFile
GetTickCount
GetEnvironmentVariableW
SizeofResource
LoadResource
FindResourceW
FreeResource
LockResource
lstrlenW
HeapAlloc
GetProcessHeap
GetCurrentProcess
HeapFree
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
WaitForSingleObject
ReleaseMutex
MultiByteToWideChar
WideCharToMultiByte
GetVersionExW
GetProcAddress
RtlUnwind
RaiseException
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetModuleHandleA
LCMapStringA
VirtualAlloc
HeapReAlloc
LoadLibraryA
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
SetEndOfFile
GetMessageW
TranslateMessage
DispatchMessageW
wsprintfW
GetSystemMetrics
LoadImageW
LoadCursorW
RegisterClassExW
CreateWindowExW
DefWindowProcW
DestroyWindow
PostQuitMessage
TranslateAcceleratorW
SHGetFolderPathW
Shell_NotifyIconW
ShellExecuteW
ord165
PathRemoveFileSpecW
PathFileExistsW
PathStripPathW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
RegSetValueExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ