Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
5d514ecf75e35859428a9f5f5570bfcf_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5d514ecf75e35859428a9f5f5570bfcf_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
5d514ecf75e35859428a9f5f5570bfcf_JaffaCakes118
Size
322KB
MD5
5d514ecf75e35859428a9f5f5570bfcf
SHA1
80a64f754dd27422a612375c76ae946674fc8d52
SHA256
3d2745ae05d43ca661a8eee1a0ba99230839f958d3a80a180ad210e7c1dd0e03
SHA512
6dbd57d40f193b213ac259ae8a4a14ffc5b04cac63b5423930df2bfa2fa72c4ded1b6a4705cc424dde335ed0f8a9439c07209853a4973bf57b3f6301c9e96f99
SSDEEP
6144:puDlOVTOV8SZ4SOEg9WmDhonrTx6ijK6basXoIagxS:JQfZ4SwfDhorTfjK6byFgxS
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Projects\dtpro-4-40-0312\ui\Helper\Release\DTHelper.pdb
GetModuleFileNameW
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
WaitForSingleObject
GetCurrentProcess
GetModuleHandleW
FreeLibrary
WriteFile
CloseHandle
DisconnectNamedPipe
ReadFile
CreateFileW
WaitNamedPipeW
GetProcAddress
LoadLibraryW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
Sleep
LocalFree
GetLastError
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
DestroyWindow
AllowSetForegroundWindow
LoadIconW
SendMessageW
CreateWindowExW
MessageBoxW
RegDeleteKeyW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
ShellExecuteExW
SHChangeNotify
ShellExecuteW
SysFreeString
?_Decref@facet@locale@std@@QAEPAV123@XZ
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@H@Z
_onexit
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
_except_handler4_common
__set_app_type
??3@YAXPAX@Z
memmove_s
memcpy_s
wmemcpy_s
wcsnlen
_vscwprintf
vswprintf_s
free
_CxxThrowException
memset
__CxxFrameHandler3
_unlock
__dllonexit
_lock
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE