Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
479478d8bb8e5732a1cdb094e23f230d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
479478d8bb8e5732a1cdb094e23f230d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
479478d8bb8e5732a1cdb094e23f230d_JaffaCakes118
Size
108KB
MD5
479478d8bb8e5732a1cdb094e23f230d
SHA1
f75e5a768bafc716ec8a3b2dbe764578f78be4dd
SHA256
76e7df79bdfab3a1c54f7611803fe750f4135bdbc373d7630eb16b137ea315c8
SHA512
ddc132934d6be3a1265066ea2080ef1cf83d0e6d3cda71b99869a2fbb8d51578fb6af5675eab29f7c531f8ec6c55a58d5e1dc4a327521a9cf53833ff91689a67
SSDEEP
1536:tJPxN1CNg7gT50kxOwkXQ/PmLF2p2IkKkxGM5UARs0W:Hx2HVnxb6wkfKkxGM5UA5W
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
f:\작업\퍼스트클릭\FirstClick(ch2)\Release\FirstClickInstaller.pdb
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
HttpQueryInfoA
InternetOpenA
InternetQueryDataAvailable
GetAdaptersInfo
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
InterlockedDecrement
GetWindowsDirectoryA
GetModuleFileNameA
CopyFileA
SizeofResource
LoadResource
FindResourceA
FindResourceExA
WideCharToMultiByte
CreateDirectoryA
GetLastError
CreateFileA
WriteFile
CloseHandle
InterlockedIncrement
WriteConsoleA
SetStdHandle
LockResource
GetStartupInfoA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetModuleHandleA
VirtualAlloc
GetLocaleInfoA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
MultiByteToWideChar
lstrlenA
GetCommandLineA
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sleep
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadStringA
RegCloseKey
RegSetValueExA
RegOpenKeyA
RegCreateKeyExA
ShellExecuteExA
OleRun
CoCreateInstance
CoInitialize
SysStringByteLen
SysAllocStringByteLen
VariantChangeType
VariantClear
VariantCopy
VariantInit
SysFreeString
SysAllocString
GetErrorInfo
PathFileExistsA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ