Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Target
82f792a1a4abab93058f916e70283252_JaffaCakes118
Size
163KB
MD5
82f792a1a4abab93058f916e70283252
SHA1
e3f6d29a1c8db005f032b4dd52c7c7711e8f4fa0
SHA256
29730548ef5cbd722c86f4cfcabb29173d38a7c538befc281cab8f96154b4655
SHA512
656f19005eab4d4d27b549f72d6ac2e190139a81beb94baec2224e0d4c51502aa141bfb0da8d1326871e88a186c204113dddd7792c4a90e1793f609238ea9422
SSDEEP
3072:oCPRY8ZGXZglH0b0seMSwiJ7ve4b75jhbB/ng:owRVllH0b0KQhnbVng
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PsGetVersion
PsGetCurrentThreadId
PsGetCurrentProcessId
__C_specific_handler
ProbeForWrite
KeDelayExecutionThread
ProbeForRead
_wcsnicmp
_stricmp
RtlDeleteRegistryValue
strstr
strrchr
ExFreePoolWithTag
strncpy
_strnicmp
PsDereferencePrimaryToken
RtlEqualSid
SeQueryInformationToken
PsReferencePrimaryToken
PsSetCreateProcessNotifyRoutine
RtlInitUnicodeString
IofCompleteRequest
__chkstk
IoCreateSymbolicLink
IoCreateDevice
PsSetLoadImageNotifyRoutine
ZwClose
ExReleaseFastMutex
ExAcquireFastMutex
ZwCreateFile
KeInitializeEvent
ExAllocatePoolWithTag
ZwQuerySystemInformation
MmIsAddressValid
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
_vsnwprintf
_wcsicmp
ZwOpenFile
MmUnmapViewInSystemSpace
MmMapViewInSystemSpace
MmCreateSection
ZwQueryInformationThread
ZwOpenThread
PsGetProcessInheritedFromUniqueProcessId
ObReferenceObjectByHandle
PsGetProcessImageFileName
ObQueryNameString
IoGetDeviceObjectPointer
KeStackAttachProcess
KeUnstackDetachProcess
PsGetProcessCreateTimeQuadPart
KeQueryTimeIncrement
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
ZwQueryInformationProcess
PsIsThreadTerminating
MmGetSystemRoutineAddress
PsGetProcessId
PsGetThreadProcess
ZwOpenProcess
ZwOpenDirectoryObject
RtlAppendUnicodeStringToString
PsLookupProcessByProcessId
strchr
PsGetProcessWin32Process
ZwQueryInformationToken
ObOpenObjectByPointer
PsGetProcessSectionBaseAddress
ZwOpenProcessTokenEx
wcschr
RtlCompareUnicodeString
ZwQueryObject
PsGetCurrentProcessSessionId
CmRegisterCallback
PsGetThreadTeb
PsLookupThreadByThreadId
RtlNtStatusToDosError
PsGetProcessPeb
RtlFreeUnicodeString
RtlWriteRegistryValue
RtlAnsiStringToUnicodeString
RtlInitAnsiString
RtlCreateUnicodeString
RtlQueryRegistryValues
wcsncpy
RtlPrefixUnicodeString
ZwQueryValueKey
ZwOpenKey
ZwSetInformationProcess
RtlLengthSid
ZwAssignProcessToJobObject
ZwSetInformationJobObject
ZwCreateJobObject
PsGetProcessJob
ZwTerminateProcess
RtlAddAccessAllowedAceEx
RtlAddAce
RtlCreateAcl
RtlGetAce
ZwSetSecurityObject
RtlSetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
RtlGetDaclSecurityDescriptor
ZwQuerySecurityObject
SeTokenIsRestricted
SeFilterToken
ObfReferenceObject
ZwCreateKey
ZwEnumerateValueKey
ZwSetValueKey
ZwDeleteValueKey
RtlCompareMemory
RtlAppendUnicodeToString
RtlFormatCurrentUserKeyPath
IoGetCurrentProcess
IoQueryFileDosDeviceName
ZwConnectPort
LpcRequestWaitReplyPort
KeBugCheckEx
ObfDereferenceObject
tolower
_vsnprintf
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
ExAllocatePool
ExFreePool
NtQuerySystemInformation
HalMakeBeep
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ