Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
4aaa65c015bb045fb5340e7b7c17e8cd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4aaa65c015bb045fb5340e7b7c17e8cd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
4aaa65c015bb045fb5340e7b7c17e8cd_JaffaCakes118
Size
309KB
MD5
4aaa65c015bb045fb5340e7b7c17e8cd
SHA1
4b82fab0d9ee2a37548ad551de9d67d942d183f7
SHA256
de00260714a0334ec2adc1f4b4ea91dfd0f8beb978e3b110010fb0bca87c16b2
SHA512
9202297a7a1efad1221dba5582ef58304f06c6b3a97ab4031aaa43443b84f4f89bdc537586a70c9cbe6a8b6c97d82f1c94367dd0b6cc41afbcc3fa8f30c83ccf
SSDEEP
6144:W4A0RpVsXRTYYZlH0LKGGw8uZwsry21b1r14ETRb:XVshUGlDwZwQyIZ14Ex
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\Documents and Settings\Timothy\My Documents\WorkCode\PIE\trunk\release\PIEService.pdb
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
GetCPInfo
GetOEMCP
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
SetStdHandle
GetFileType
ExitProcess
RtlUnwind
RaiseException
ExitThread
CreateThread
HeapSize
GlobalGetAtomNameA
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetConsoleCP
GetConsoleMode
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GlobalFindAtomA
lstrcmpW
GetCurrentProcessId
GlobalAddAtomA
InterlockedIncrement
LocalReAlloc
GlobalHandle
GlobalReAlloc
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
LocalAlloc
SetEndOfFile
SetFilePointer
GetThreadLocale
CreateEventA
SetEvent
WaitForSingleObject
SetThreadPriority
GlobalFree
GlobalUnlock
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
HeapFree
GetProcessHeap
HeapAlloc
WritePrivateProfileStringA
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStdHandle
TerminateProcess
LocalFree
FormatMessageA
GetCurrentProcess
CreateNamedPipeA
GetModuleFileNameA
GetVersionExA
WriteFile
ReadFile
SetLastError
Sleep
VirtualFree
VirtualAlloc
LoadLibraryA
GetProcAddress
CreateFileA
FreeLibrary
lstrlenA
GetVersion
MultiByteToWideChar
InterlockedExchange
CompareStringA
ResumeThread
SuspendThread
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
DisconnectNamedPipe
FlushFileBuffers
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
CloseHandle
ConnectNamedPipe
GetLastError
GetModuleHandleA
GetCommandLineA
CreateFileW
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
RegisterWindowMessageA
GetSysColorBrush
LoadCursorA
UnregisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowThreadProcessId
GetLastActivePopup
EnableWindow
MessageBoxA
GetWindow
GetDlgCtrlID
GetWindowRect
GetWindowLongA
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
GetSysColor
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
SetCursor
SetMenuItemBitmaps
ShowWindow
DestroyMenu
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostMessageA
PostQuitMessage
GetSystemMetrics
DispatchMessageA
TranslateMessage
GetMessageA
IsWindowEnabled
CallWindowProcA
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
DeleteObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
PtVisible
DocumentPropertiesA
ClosePrinter
OpenPrinterA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
InitializeSecurityDescriptor
RegQueryValueExA
RegOpenKeyExA
GetSecurityDescriptorControl
IsValidSid
GetSecurityDescriptorLength
MakeSelfRelativeSD
GetLengthSid
GetSecurityDescriptorSacl
RegCloseKey
SetSecurityDescriptorDacl
LookupAccountNameA
GetSecurityDescriptorDacl
CopySid
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
GetSecurityInfo
GetAce
GetAclInformation
SetServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceCtrlDispatcherA
PathFindExtensionA
PathFindFileNameA
CoInitializeEx
CoUninitialize
VariantClear
VariantChangeType
VariantInit
inflate
inflateInit2_
inflateEnd
Tcl_SetResult
Tcl_DeleteClone
Tcl_CloneInterp
Tcl_CreateInterp
Tcl_ProcCmd
Tcl_GetStringResult
Tcl_FreeList
Tcl_EvalEx
Tcl_DeleteInterp
Tcl_CreateCommand
Tcl_SplitList
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ