Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
93ca67baf863b8158d03e11d67909623_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
93ca67baf863b8158d03e11d67909623_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
93ca67baf863b8158d03e11d67909623_JaffaCakes118
Size
97KB
MD5
93ca67baf863b8158d03e11d67909623
SHA1
9ec7e4b12eea66c67c7e3ffc673671eb35fdc800
SHA256
3afb50a1a92952dd502e4c30a39150ccb5a026f9c2b1848b8dd2b88217b12eab
SHA512
f8e42d6ba2432d885fb68de897df9f6c6ba9256d614dda8add7e4d9ce6f5e77911d9826b1fd6892d16dd74ea04d4717274c141d1aa8fde4e289dbcceaa79946d
SSDEEP
1536:7KCYGHOZfz5m+iQuVbo7aOak/AkbC+92pkFJ7R1t/QiG4h/g9isKldh:7KhtDiXbgLLbC+qs7R1tYiGcd
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\coretech\source\roxy\aum\public\aum\binaries\windows\release\AdobeUpdaterInstallMgr.pdb
CreateProcessW
GetModuleFileNameW
lstrcpynW
lstrlenW
SetLastError
GetFullPathNameW
GetFileAttributesW
GetModuleHandleW
CreateDirectoryW
WideCharToMultiByte
MultiByteToWideChar
GetACP
CloseHandle
GetLastError
LoadLibraryW
GetProcAddress
FreeLibrary
CreateFileA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LCMapStringA
LCMapStringW
GetCPInfo
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
SHGetMalloc
SHGetPathFromIDListW
SHGetDesktopFolder
SHGetSpecialFolderLocation
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE