Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
440f402a1d01e00e432b006f19d53984_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
440f402a1d01e00e432b006f19d53984_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
440f402a1d01e00e432b006f19d53984_JaffaCakes118
Size
628KB
MD5
440f402a1d01e00e432b006f19d53984
SHA1
978fd8c1d8f4a8303dfedd180945a80b7d169e77
SHA256
6dbcb3b1dc7a5dc10a2440241c192039bc0b5fc552ce4997bbb5f927dae816ab
SHA512
1d74ed08fb8f634d30063a7b25fc89b7888e8edbdce2c39e91bbd1da755b79fddcd1a3d5c2ee22e388a1d194604c8af2df32066704d607e0e9bf3055988badcd
SSDEEP
12288:MRJpwuNy2MbVPNR3Sf+6mL3EsfcW7Q4rqUil/Z2E6i:MRJyuNy2+L3Sf+6mL37fcWk4rqUiv
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
c:\build\HARP_REL_5_30_21\win_external_wl\src\tools\install\app\bcmwls\x64\Release\bcmwls64.pdb
SetupIterateCabinetW
SetupOpenFileQueue
SetupDefaultQueueCallbackW
SetupInitDefaultQueueCallbackEx
SetupCommitFileQueueW
SetupScanFileQueueW
SetupGetFileCompressionInfoW
SetupDecompressOrCopyFileW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupCopyOEMInfW
SetupCloseFileQueue
SetupTermDefaultQueueCallback
SetupGetBinaryField
SetupGetIntField
SetupGetStringFieldW
SetupGetFieldCount
SetupFindNextMatchLineW
SetupGetLineTextW
SetupGetLineByIndexW
SetupFindFirstLineW
SetupGetLineCountW
SetupOpenInfFileW
SetupCloseInfFile
CM_Locate_DevNodeW
CM_Reenumerate_DevNode
CMP_WaitNoPendingInstallEvents
SetupDiSetClassInstallParamsW
SetupDiCallClassInstaller
SetupDiGetDeviceInstallParamsW
CM_Get_DevNode_Status
SetupDiOpenDevRegKey
CM_Get_DevNode_Registry_PropertyW
SetupDiGetClassDevsW
SetupDiGetDeviceRegistryPropertyW
SetupDiSetDeviceRegistryPropertyW
SetupGetTargetPathW
SetupGetSourceFileLocationW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
WinVerifyTrust
RtlLookupFunctionEntry
GetLocaleInfoA
GetACP
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetProcessHeap
HeapSize
SetEnvironmentVariableA
CompareStringW
CompareStringA
CreateFileA
SetEndOfFile
GetLocaleInfoW
GetFileAttributesW
ExpandEnvironmentStringsW
lstrcpyW
lstrcatW
CloseHandle
GetCurrentProcess
GetModuleHandleW
GetSystemDirectoryW
FreeLibrary
GetProcAddress
LoadLibraryW
GetLastError
GetSystemWow64DirectoryW
GetCommandLineW
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
Sleep
Module32NextW
Module32FirstW
CreateToolhelp32Snapshot
SetThreadLocale
GetThreadLocale
CreateFileW
DeleteFileW
FlushFileBuffers
RtlUnwindEx
ReadFile
SetFilePointer
SetErrorMode
SetNamedPipeHandleState
DuplicateHandle
CreatePipe
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
GetCurrentProcessId
OutputDebugStringW
OutputDebugStringA
MoveFileExW
SetFileAttributesW
CopyFileW
LocalFree
GetModuleHandleA
GetStdHandle
MoveFileW
RemoveDirectoryW
MultiByteToWideChar
GetVersionExW
GetVersionExA
GetFullPathNameW
GetTempFileNameW
GetModuleFileNameW
GetWindowsDirectoryW
GetCurrentDirectoryW
FindClose
FindFirstFileW
LocalAlloc
GetCurrentThread
GetUserDefaultLangID
WideCharToMultiByte
FormatMessageW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
RtlPcToFileHeader
TerminateProcess
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlCaptureContext
GetSystemTimeAsFileTime
SetStdHandle
GetFileType
RtlVirtualUnwind
FlsGetValue
TlsAlloc
FlsSetValue
TlsFree
FlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
FlsAlloc
ExitProcess
GetModuleFileNameA
HeapSetInformation
HeapCreate
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringA
WriteFile
GetStringTypeA
LoadLibraryA
SetConsoleCtrlHandler
GetTickCount
QueryPerformanceCounter
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
GetStartupInfoA
SetHandleCount
FatalAppExitA
GetConsoleMode
GetConsoleCP
HeapDestroy
HeapAlloc
HeapFree
LCMapStringW
GetClassNameW
SendMessageTimeoutW
GetWindowTextW
GetWindowThreadProcessId
UnregisterClassA
EnumWindows
ExitWindowsEx
RegOpenKeyExW
RegEnumValueW
ImpersonateSelf
OpenThreadToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegLoadKeyW
RegUnLoadKeyW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryValueExW
RegCloseKey
SHGetPathFromIDListW
SHBindToParent
SHFileOperationW
SHGetSpecialFolderPathW
SHBrowseForFolderW
SHGetMalloc
SHSetLocalizedName
SHCreateDirectoryExW
CoInitializeEx
CoUninitialize
CoCreateInstance
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
SHDeleteKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ