Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
773afaa800f539ce195540e2f1882270_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
773afaa800f539ce195540e2f1882270_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
773afaa800f539ce195540e2f1882270_JaffaCakes118
Size
309KB
MD5
773afaa800f539ce195540e2f1882270
SHA1
b6d57573dd36ed341bdc57ae94a333060da0f4ca
SHA256
8585342d297b4726900e8818817b14042e1a3da5a1497380572a64dcf6d4819c
SHA512
4f61e499de4817c5c7978ebd26e0975bbe7722cc64cb17029191725c32d02210666ff6ea6be5f9be4ca88a9d06daf64ca836a9e1e1024fca1f4b22d871d60090
SSDEEP
3072:g6UhurfThhxxfNNRBaIjzj7OUgnxP2MKOc2OOpnumK2++Jr1Va7KgCLaZNxkV54d:4unTx9RBaIjzeZnZOOb7lR2ia3qVGMu
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
F:\Excalibur\Excalibur\Excalibur\bin\oSaberSvc.pdb
MultiByteToWideChar
WideCharToMultiByte
CreateProcessW
GetFileAttributesA
GetSystemDefaultLangID
GetFileAttributesW
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
TerminateProcess
Process32NextW
CreateThread
ProcessIdToSessionId
GetProcAddress
GetModuleHandleW
GetCurrentProcess
GlobalAlloc
DeviceIoControl
GlobalFree
GetVolumeInformationW
CopyFileW
SetEndOfFile
WriteConsoleW
WinExec
DeleteFileW
GetModuleFileNameW
GetTempFileNameW
GetEnvironmentVariableW
GetVersionExW
SetFileAttributesW
FindClose
SetFileTime
CreateDirectoryW
FindFirstFileW
CloseHandle
GetLastError
CreateFileW
ReadFile
WriteFile
SetFilePointer
Sleep
SetStdHandle
LoadLibraryW
OutputDebugStringW
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetCurrentThreadId
FlushFileBuffers
GetOEMCP
GetACP
IsValidCodePage
LoadLibraryExW
GetFileType
SetFilePointerEx
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetProcessHeap
GetStdHandle
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetStringTypeW
HeapFree
HeapAlloc
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineW
RaiseException
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
wsprintfW
RegisterServiceCtrlHandlerW
SetServiceStatus
DeleteService
ControlService
StartServiceW
QueryServiceStatus
OpenServiceW
CloseServiceHandle
ChangeServiceConfig2W
CreateServiceW
OpenSCManagerW
CreateProcessAsUserW
DuplicateTokenEx
LookupPrivilegeValueW
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
StartServiceCtrlDispatcherW
recv
inet_addr
gethostbyname
gethostname
connect
send
socket
ioctlsocket
htons
WSAStartup
WSACleanup
closesocket
PathAppendW
PathRemoveFileSpecW
InternetOpenUrlW
InternetOpenW
InternetCrackUrlW
HttpQueryInfoW
InternetReadFile
InternetConnectW
InternetCloseHandle
HttpOpenRequestW
HttpSendRequestW
CreateEnvironmentBlock
DestroyEnvironmentBlock
WTSFreeMemory
WTSQueryUserToken
WTSEnumerateSessionsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ