Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
4a11d2d52d675ab2800456ad16f2fc71_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4a11d2d52d675ab2800456ad16f2fc71_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
4a11d2d52d675ab2800456ad16f2fc71_JaffaCakes118
Size
522KB
MD5
4a11d2d52d675ab2800456ad16f2fc71
SHA1
fbd5042ac16127afe1da2fd4f85d0d26999d70bd
SHA256
a1779641cd3feab3963f6d64130a3b52054bf8eab187a8c869c7c466525da27c
SHA512
b6d5c45a05331948c2717539a791493c5faf4d28cd79540c09fd3983a9fbf4e7d8ff5782dfae6a2952ba7e081350c369cbb7e80e0c466095ede962aca794c337
SSDEEP
6144:KlpNB8cHG9pOjaqsk4JRTptu3EFCfIaBNHnYtckXv38utL:KVON9Y4JRT/q8CAaNHCcMv/
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\build\source\videoeditorlauncher\rel32\RealTrimmer.pdb
OleUninitialize
OleInitialize
GetSystemMetrics
CharNextA
ReleaseDC
GetDC
SendMessageA
RegisterWindowMessageA
FindWindowA
GetWindowThreadProcessId
GetClassInfoExA
RegisterClassExA
CreateWindowExA
GetWindowLongA
DefWindowProcA
SetWindowLongA
UnregisterClassA
DestroyWindow
CloseHandle
WaitForSingleObject
CreateMutexA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
SetFilePointer
LocalAlloc
GetVersion
GetSystemInfo
MultiByteToWideChar
CreateDirectoryA
GetFileAttributesA
CreateFileA
DeleteFileA
GetVersionExA
ReleaseMutex
FreeLibrary
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetCommandLineW
LocalFree
GetModuleHandleA
GetProcAddress
FindResourceExA
FindResourceA
GlobalMemoryStatus
LoadResource
LockResource
SizeofResource
GetLastError
RaiseException
GetEnvironmentVariableA
GetModuleFileNameA
SetEnvironmentVariableA
SetErrorMode
SetCurrentDirectoryA
GetCurrentDirectoryA
IsBadWritePtr
VirtualProtect
IsBadReadPtr
TerminateThread
CreateThread
WriteFile
GetThreadContext
LoadLibraryA
lstrlenA
VirtualQuery
OpenProcess
MoveFileA
SHGetFolderPathA
CommandLineToArgvW
SHGetFolderPathW
_crt_debugger_hook
_controlfp_s
_invoke_watson
printf
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
_amsg_exit
malloc
memcpy
wcsnlen
memset
_recalloc
calloc
free
memmove_s
_purecall
memcpy_s
strncpy
strrchr
??3@YAXPAX@Z
_stricmp
wcsstr
atoi
strnlen
_gmtime32
_time32
vsprintf
asctime
__getmainargs
_putenv
?terminate@@YAXXZ
getenv
??_V@YAXPAX@Z
realloc
sprintf
_vsnprintf
memmove
??2@YAPAXI@Z
strchr
strstr
strtol
??_U@YAPAXI@Z
CreateWellKnownSid
RegOpenKeyExA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyA
RegSetValueA
RegQueryValueA
RegDeleteValueA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegSetValueExA
SetFileSecurityW
ConvertStringSecurityDescriptorToSecurityDescriptorW
FreeSid
SetNamedSecurityInfoW
OpenProcessToken
AllocateAndInitializeSid
SetEntriesInAclA
GetNamedSecurityInfoW
AdjustTokenPrivileges
LookupPrivilegeValueA
RegEnumKeyExA
PathFindNextComponentW
PathAddBackslashA
PathAppendA
PathStripToRootW
GetFileVersionInfoA
VerQueryValueA
GetDeviceCaps
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ