Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
436ebb3bd9ed78308954706939143782_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
436ebb3bd9ed78308954706939143782_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
436ebb3bd9ed78308954706939143782_JaffaCakes118
Size
462KB
MD5
436ebb3bd9ed78308954706939143782
SHA1
bf3212ca78dbee1342d17603bb48bc6556c418f1
SHA256
48346b3babf0894d79552996065fe85430e00fd1c76531fa864e678b44152912
SHA512
98c01f9034f8438412951f93e607c8475880efede0b71c442ed90e34c29389700a871dda51a89fc609e74a41259653f05236fb25adfb1b2ef7ae368f9c341c62
SSDEEP
12288:02QbNxKLFn0J97pR1sK6KzpyR7Js5seEHI/EJ:yxenqvR1src9IX
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
d:\김민정\프로그램\업데이트모듈\동의창\Cobato\소스\업데이터\cbtup.exe_1.0.0.1\Release\VersionChecker.pdb
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
LCMapStringA
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
ResetEvent
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
CreateThread
ExitThread
RtlUnwind
ExitProcess
WritePrivateProfileStringA
SetErrorMode
GetOEMCP
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GetFileTime
GetFileAttributesA
RaiseException
FindNextFileA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
SuspendThread
SetThreadPriority
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
FormatMessageA
LocalFree
GetModuleFileNameA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
SetLastError
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GetProcAddress
GetCurrentProcess
Process32First
Process32Next
GetExitCodeProcess
CreateToolhelp32Snapshot
Module32First
Module32Next
OpenProcess
TerminateProcess
GetSystemDirectoryA
GetWindowsDirectoryA
CreateFileA
WriteFile
GetTickCount
OutputDebugStringA
GlobalReAlloc
GetCPInfo
GetCurrentDirectoryA
WinExec
DeleteFileA
Sleep
InterlockedIncrement
CreateMutexA
InterlockedDecrement
CompareStringW
CompareStringA
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
FindResourceA
LoadResource
SizeofResource
FreeResource
LockResource
GlobalLock
GlobalUnlock
MulDiv
GlobalFree
CreateEventA
ResumeThread
GlobalAlloc
SetEvent
WaitForSingleObject
CloseHandle
LCMapStringW
SetCapture
RegisterClipboardFormatA
SetRectEmpty
CharNextA
DestroyMenu
SetWindowContextHelpId
MapDialogRect
CreateDialogIndirectParamA
EndDialog
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
GetMenuStringA
wsprintfA
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
EndPaint
BeginPaint
GetWindowDC
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsWindow
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
IsRectEmpty
MapWindowPoints
MessageBoxA
TrackPopupMenu
GetKeyState
SetForegroundWindow
UpdateWindow
GetMenu
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
FillRect
GetSysColor
ReleaseDC
GetDC
CopyRect
InvalidateRect
EnableWindow
SetRect
CharUpperA
PostQuitMessage
DrawIcon
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowPos
IntersectRect
GetWindowPlacement
PtInRect
GetWindow
ReleaseCapture
SetWindowRgn
LoadImageA
PostMessageA
DestroyCursor
WindowFromPoint
GetParent
CopyAcceleratorTableA
GetNextDlgGroupItem
MessageBeep
GetNextDlgTabItem
GetActiveWindow
ClientToScreen
FrameRect
OffsetRect
InflateRect
DrawStateA
IsMenu
GetMenuItemInfoA
GetSysColorBrush
SystemParametersInfoA
DrawIconEx
DestroyIcon
GrayStringA
DrawTextExA
DrawTextA
SetParent
PostThreadMessageA
LockWindowUpdate
GetDCEx
PeekMessageA
AppendMenuA
SendMessageA
GetSystemMenu
IsIconic
GetWindowRect
GetClientRect
IsWindowVisible
SetTimer
KillTimer
LoadIconA
GetSystemMetrics
FindWindowA
SetWindowLongA
GetWindowLongA
SetCursor
LoadCursorA
LoadBitmapA
DrawEdge
CreateMenu
CreatePopupMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSubMenu
ModifyMenuA
GetDesktopWindow
TabbedTextOutA
InvalidateRgn
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetCharWidthA
SetRectRgn
GetMapMode
GetRgnBox
CreatePatternBrush
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
SelectClipRgn
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
SetMapMode
CreateFontA
BitBlt
SetBkMode
RestoreDC
SaveDC
GetClipBox
ExtCreateRegion
CombineRgn
StretchDIBits
CreateBitmap
SetBkColor
SetTextColor
GetStockObject
CreateDIBSection
GetTextExtentPoint32W
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetTextExtentPoint32A
SetPixel
GetPixel
PatBlt
Ellipse
GetBkMode
GetObjectA
CreateFontIndirectA
CreatePen
GetDeviceCaps
CreateSolidBrush
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
GetFileTitleA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegOpenKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegSetValueExA
SHGetSpecialFolderLocation
ShellExecuteA
SHGetSpecialFolderPathA
ShellExecuteExA
SHGetPathFromIDListA
ord17
ImageList_GetImageCount
ImageList_AddMasked
ImageList_ReplaceIcon
ImageList_GetIcon
ImageList_Draw
_TrackMouseEvent
ImageList_Destroy
ImageList_Create
SHDeleteKeyA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
SHDeleteValueA
UrlUnescapeA
ord8
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
CoGetClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
SysFreeString
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
OleCreateFontIndirect
VariantCopy
SafeArrayDestroy
SystemTimeToVariantTime
SysAllocString
URLDownloadToFileA
InternetOpenUrlA
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetGetLastResponseInfoA
InternetQueryDataAvailable
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetErrorDlg
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
GdipCloneImage
GdiplusStartup
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipDisposeImage
GdipAlloc
GdipFree
GdiplusShutdown
GetAdaptersInfo
PlaySoundA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ