Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
151be82bb97dfc90075c7431daeb4752_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
151be82bb97dfc90075c7431daeb4752_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Target
151be82bb97dfc90075c7431daeb4752_JaffaCakes118
Size
108KB
MD5
151be82bb97dfc90075c7431daeb4752
SHA1
085fe85b2b4287c114ca792cc13d32f195018083
SHA256
2685d8df823e06f633f926455e0e00519a5335d883c0d5b2934c5b80243a28da
SHA512
b14485e12565a7b5b1d190c94f211c9ab5b75d4dea154972258772d7b3c4c131dedebe604427fbbd9626e00975b43ab51be4d98d86938a9671d097bc88c7cdd8
SSDEEP
1536:zJ/xNFyNg7gTpUEB25xXQ/Pm7FGk2IkAOrXxGM5U9ahDW:dxWHFnB255wrfAOrXxGM5U96W
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
F:\work\퍼스트클릭\FirstClick(ch1)\Release\FirstClickInstaller.pdb
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
HttpQueryInfoA
InternetOpenA
InternetQueryDataAvailable
GetAdaptersInfo
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
InterlockedDecrement
GetWindowsDirectoryA
GetModuleFileNameA
CopyFileA
SizeofResource
LoadResource
FindResourceA
FindResourceExA
WideCharToMultiByte
CreateDirectoryA
GetLastError
CreateFileA
WriteFile
CloseHandle
InterlockedIncrement
WriteConsoleA
SetStdHandle
LockResource
GetStartupInfoA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetModuleHandleA
VirtualAlloc
GetLocaleInfoA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
MultiByteToWideChar
lstrlenA
GetCommandLineA
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sleep
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadStringA
RegCloseKey
RegSetValueExA
RegOpenKeyA
RegCreateKeyExA
ShellExecuteExA
OleRun
CoCreateInstance
CoInitialize
SysStringByteLen
SysAllocStringByteLen
VariantChangeType
VariantClear
VariantCopy
VariantInit
SysFreeString
SysAllocString
GetErrorInfo
PathFileExistsA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ