Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
666528ab1dcc9902f2ce4f855d8ff7c5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
666528ab1dcc9902f2ce4f855d8ff7c5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
666528ab1dcc9902f2ce4f855d8ff7c5_JaffaCakes118
Size
309KB
MD5
666528ab1dcc9902f2ce4f855d8ff7c5
SHA1
e8eb5f3feaef84065ca773adbdaced92e1e8adb4
SHA256
deb8ced6b49d6c3ca2f7b9ce05257157c039dc32e76bd7753ce1bc9a64f4137a
SHA512
aa5b6f40b8dc3a0d34f0fa5eafb9a6611edc9fb7f08185cbc2dfc71477c91337553c127bf60ed056faa3080f536acdaae4ec0337dfb72618e4d0321b8082d775
SSDEEP
6144:p4A0RpVsXRTYYZlH0LKGGw8uZwsry21b1r14ETRo:2VshUGlDwZwQyIZ14Eu
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\Documents and Settings\Timothy\My Documents\WorkCode\PIE\trunk\release\PIEService.pdb
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
GetCPInfo
GetOEMCP
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
SetStdHandle
GetFileType
ExitProcess
RtlUnwind
RaiseException
ExitThread
CreateThread
HeapSize
GlobalGetAtomNameA
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetConsoleCP
GetConsoleMode
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GlobalFindAtomA
lstrcmpW
GetCurrentProcessId
GlobalAddAtomA
InterlockedIncrement
LocalReAlloc
GlobalHandle
GlobalReAlloc
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
LocalAlloc
SetEndOfFile
SetFilePointer
GetThreadLocale
CreateEventA
SetEvent
WaitForSingleObject
SetThreadPriority
GlobalFree
GlobalUnlock
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
HeapFree
GetProcessHeap
HeapAlloc
WritePrivateProfileStringA
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStdHandle
TerminateProcess
LocalFree
FormatMessageA
GetCurrentProcess
CreateNamedPipeA
GetModuleFileNameA
GetVersionExA
WriteFile
ReadFile
SetLastError
Sleep
VirtualFree
VirtualAlloc
LoadLibraryA
GetProcAddress
CreateFileA
FreeLibrary
lstrlenA
GetVersion
MultiByteToWideChar
InterlockedExchange
CompareStringA
ResumeThread
SuspendThread
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
DisconnectNamedPipe
FlushFileBuffers
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
CloseHandle
ConnectNamedPipe
GetLastError
GetModuleHandleA
GetCommandLineA
CreateFileW
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
RegisterWindowMessageA
GetSysColorBrush
LoadCursorA
UnregisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowThreadProcessId
GetLastActivePopup
EnableWindow
MessageBoxA
GetWindow
GetDlgCtrlID
GetWindowRect
GetWindowLongA
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
GetSysColor
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
SetCursor
SetMenuItemBitmaps
ShowWindow
DestroyMenu
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostMessageA
PostQuitMessage
GetSystemMetrics
DispatchMessageA
TranslateMessage
GetMessageA
IsWindowEnabled
CallWindowProcA
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
DeleteObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
PtVisible
DocumentPropertiesA
ClosePrinter
OpenPrinterA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
InitializeSecurityDescriptor
RegQueryValueExA
RegOpenKeyExA
GetSecurityDescriptorControl
IsValidSid
GetSecurityDescriptorLength
MakeSelfRelativeSD
GetLengthSid
GetSecurityDescriptorSacl
RegCloseKey
SetSecurityDescriptorDacl
LookupAccountNameA
GetSecurityDescriptorDacl
CopySid
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
GetSecurityInfo
GetAce
GetAclInformation
SetServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceCtrlDispatcherA
PathFindExtensionA
PathFindFileNameA
CoInitializeEx
CoUninitialize
VariantClear
VariantChangeType
VariantInit
inflate
inflateInit2_
inflateEnd
Tcl_SetResult
Tcl_DeleteClone
Tcl_CloneInterp
Tcl_CreateInterp
Tcl_ProcCmd
Tcl_GetStringResult
Tcl_FreeList
Tcl_EvalEx
Tcl_DeleteInterp
Tcl_CreateCommand
Tcl_SplitList
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ