Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
59f19e34662eeb71d6d8d0a3b6e83d95_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
59f19e34662eeb71d6d8d0a3b6e83d95_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
59f19e34662eeb71d6d8d0a3b6e83d95_JaffaCakes118
Size
104KB
MD5
59f19e34662eeb71d6d8d0a3b6e83d95
SHA1
7f92d79ccdccb1d2ff5b20fc32127c9b36bf5418
SHA256
9bd9dddd984abb4d657dc22a4b394126d51f2c2986e11ede76267696297d63b2
SHA512
722de98efc05cf2e3e7fd076cf7ecbeb49ecfca67a8fd507a62f9a7c20245056dc67b7efb1b18a547322a14d74b7a6ce5e7046f3f9adda22ad375bca937512e8
SSDEEP
1536:iNEiWQnz7iuDuRLVy2z57NmWerZdDoLHSWNQeNIuGx4izmq6v0FhQf57XDgZu+QU:mny3UW0DorSWNQeNuU5AQfNDgZQKbUY
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\Projects.NET\UInstall\UInstall\Release\UInstall.pdb
LockResource
GetVersionExA
LoadLibraryA
FreeLibrary
GetTempPathA
GetFileAttributesA
GetWindowsDirectoryA
lstrcpyA
CreateDirectoryA
GetLastError
GetCurrentProcessId
DeleteFileA
GetProcAddress
WaitForSingleObject
CloseHandle
CreateFileA
WriteFile
GetModuleFileNameA
lstrlenA
GetTempFileNameA
GetShortPathNameA
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
ResumeThread
GetProcessHeap
RaiseException
lstrcmpiA
GetStringTypeExA
GetThreadLocale
lstrcmpA
FindResourceExA
WideCharToMultiByte
InterlockedExchange
GetACP
GetLocaleInfoA
DeleteCriticalSection
InitializeCriticalSection
GetFileSize
LoadResource
MapViewOfFile
CompareStringA
UnmapViewOfFile
SetFilePointer
SetEndOfFile
lstrcatA
MultiByteToWideChar
OpenProcess
TerminateProcess
lstrlenW
RemoveDirectoryA
lstrcpynA
FileTimeToSystemTime
FlushInstructionCache
HeapAlloc
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
VirtualQuery
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetModuleHandleA
ExitProcess
HeapSize
HeapReAlloc
HeapDestroy
LocalAlloc
SizeofResource
FindResourceA
SystemTimeToFileTime
GetLocalTime
GetCommandLineA
CreateFileMappingA
HeapFree
DestroyWindow
PostQuitMessage
CharNextA
wsprintfA
UnregisterClassA
RegisterClassExA
GetClassInfoExA
LoadCursorA
CreateWindowExA
GetSystemMetrics
SendMessageTimeoutA
IsWindow
GetWindowThreadProcessId
FindWindowA
CallWindowProcA
DefWindowProcA
GetWindowLongA
SetWindowLongA
wvsprintfA
CharUpperA
MessageBoxA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
SHGetPathFromIDListA
SHFileOperationA
SHGetMalloc
ShellExecuteExA
ShellExecuteA
SHGetSpecialFolderLocation
CoUninitialize
CoInitialize
CoCreateInstance
VarR8FromStr
PathGetArgsA
PathFindFileNameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ