Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
7607356017b8b678cbdf2f4c711ce613_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7607356017b8b678cbdf2f4c711ce613_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
7607356017b8b678cbdf2f4c711ce613_JaffaCakes118
Size
321KB
MD5
7607356017b8b678cbdf2f4c711ce613
SHA1
aafb52649122d31d92df3b070561914297ee076e
SHA256
f9ddc86366d2809ebe95857693f2568a9099a8030d0f33450eb5daafa77a4390
SHA512
295b8aefe19fecc75d661ed2e9c2502727121b34b144d84150782c70cd61a1edbb5abdc7803c0b361b812dfdad8b8f9b0cf15598e79d1fa285f00a3dd0abc965
SSDEEP
6144:wXqim0k0JHVKKCoZ9x4qBFjA9iw/k0NLEpd/vS7v:wXqUX4qB96ipUolS
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\WorkCode\PIE\trunk\release\PIEService.pdb
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
GlobalAddAtomA
lstrcmpW
GlobalFindAtomA
GetFileAttributesA
GetCPInfo
GetOEMCP
HeapReAlloc
VirtualProtect
VirtualAlloc
VirtualQuery
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
SetStdHandle
GetFileType
GetTimeFormatA
GetDateFormatA
SetCurrentDirectoryA
SetEnvironmentVariableA
ExitProcess
RaiseException
GlobalFlags
HeapSize
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetACP
IsValidCodePage
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetLocaleInfoW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentDirectoryA
WritePrivateProfileStringA
WaitForSingleObject
InterlockedIncrement
GlobalGetAtomNameA
InterlockedDecrement
GetModuleFileNameW
LocalReAlloc
GlobalHandle
GlobalReAlloc
GetCurrentProcessId
LocalAlloc
FileTimeToLocalFileTime
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
SetFilePointer
GetThreadLocale
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetProcessHeap
GetVersionExA
GetSystemInfo
FormatMessageA
FileTimeToSystemTime
GetFileTime
CreateThread
TerminateProcess
GetCurrentProcess
GetStdHandle
CreateDirectoryA
GetLocalTime
GetModuleFileNameA
lstrcpyA
InitializeCriticalSection
LoadLibraryA
GetProcAddress
WriteFile
HeapCreate
MoveFileA
LeaveCriticalSection
DeleteFileA
HeapCompact
EnterCriticalSection
HeapAlloc
ReadFile
HeapDestroy
CreateFileA
HeapFree
FreeLibrary
SetLastError
DeleteCriticalSection
Sleep
FindClose
FindFirstFileA
ResumeThread
SuspendThread
MultiByteToWideChar
LockResource
WideCharToMultiByte
ConnectNamedPipe
CreateNamedPipeA
GetEnvironmentVariableA
GetVersion
InterlockedExchange
lstrlenA
CompareStringW
TlsGetValue
CompareStringA
TlsSetValue
TlsAlloc
TlsFree
CloseHandle
LocalFree
DisconnectNamedPipe
FlushFileBuffers
SizeofResource
LoadResource
FindResourceA
GetLastError
GetModuleHandleA
GetCommandLineA
RtlUnwind
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
WinHelpA
LoadIconA
RegisterWindowMessageA
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
UnregisterClassA
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
LoadCursorA
ShowWindow
DestroyMenu
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowTextA
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
PostMessageA
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSystemMetrics
CharUpperA
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowTextA
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
GetClipBox
DeleteObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
PtVisible
GetFileTitleA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
EqualSid
LookupAccountSidA
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
RegQueryValueExA
RegOpenKeyExA
OpenProcessToken
RegCloseKey
SetServiceStatus
LookupAccountNameA
GetAclInformation
InitializeSecurityDescriptor
GetSecurityInfo
CopySid
GetSecurityDescriptorControl
GetSecurityDescriptorLength
MakeSelfRelativeSD
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
IsValidSid
GetSecurityDescriptorOwner
GetLengthSid
GetAce
RegisterServiceCtrlHandlerExA
StartServiceCtrlDispatcherA
SHGetFolderPathA
PathFileExistsA
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathIsDirectoryA
CoUninitialize
CoInitializeEx
VariantInit
VariantClear
VariantChangeType
UnloadUserProfile
inflate
inflateInit2_
inflateEnd
Tcl_CreateCommand
Tcl_DeleteInterp
Tcl_EvalEx
Tcl_GetStringResult
Tcl_ProcCmd
Tcl_ResetResult
Tcl_CreateInterp
Tcl_CloneInterp
Tcl_DeleteClone
Tcl_SetResult
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ