Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
a3d29cf0f60ac9732079279068119473_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a3d29cf0f60ac9732079279068119473_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a3d29cf0f60ac9732079279068119473_JaffaCakes118
Size
831KB
MD5
a3d29cf0f60ac9732079279068119473
SHA1
9a0c88cc536494abeef64ca94fb0f69c61a68c99
SHA256
fb2a2a2d5f6dded8fa7e48edb5a6d3b8cdd1b330fda7e4b9a791d3c7b61da63d
SHA512
c54f496a2fd43869d3735ced3385ca472f8d4a2a84b0a2e70c25463f4d7bee8ecd644f222dfe90d4d4cb2e85184674cd85ad53e447cb7ffd7540a713001ada98
SSDEEP
12288:uKMirxtUjdj/ZHpuE/8TFv9srNLnMDihosLxn62FiKcwFuOql2dipDUX9Evy5UWD:uZiltFiTMDerLx3xcuuOldid5QD
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\Projects\WhenU\UInstallProject\UInstall\Release\UInstall.pdb
GetVersionExA
LoadLibraryA
FreeLibrary
GetTempPathA
GetFileAttributesA
GetWindowsDirectoryA
lstrcpyA
CreateDirectoryA
GetLastError
GetCurrentProcessId
DeleteFileA
GetProcAddress
WaitForSingleObject
CloseHandle
MultiByteToWideChar
CreateFileA
WriteFile
GetModuleFileNameA
lstrlenA
GetTempFileNameA
GetShortPathNameA
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
ResumeThread
GetProcessHeap
RaiseException
FindResourceExA
WideCharToMultiByte
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
DeleteCriticalSection
InitializeCriticalSection
GetFileSize
CreateFileMappingA
MapViewOfFile
CompareStringA
UnmapViewOfFile
SetFilePointer
SetEndOfFile
LockResource
GetSystemDirectoryA
lstrcatA
OpenProcess
TerminateProcess
lstrlenW
RemoveDirectoryA
lstrcpynA
FileTimeToSystemTime
FlushInstructionCache
HeapAlloc
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
SetStdHandle
RtlUnwind
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
LoadResource
SizeofResource
FindResourceA
SystemTimeToFileTime
GetLocalTime
GetCommandLineA
lstrcmpiA
HeapFree
GetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCPInfo
GetOEMCP
VirtualFree
HeapCreate
ExitProcess
GetStartupInfoA
GetModuleHandleA
VirtualQuery
LocalAlloc
HeapDestroy
HeapReAlloc
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
wsprintfA
PostQuitMessage
CharNextA
UnregisterClassA
CreateWindowExA
LoadCursorA
GetClassInfoExA
RegisterClassExA
DestroyWindow
GetSystemMetrics
SendMessageTimeoutA
IsWindow
GetWindowThreadProcessId
FindWindowA
CallWindowProcA
DefWindowProcA
GetWindowLongA
SetWindowLongA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
SHFileOperationA
ShellExecuteExA
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
CoCreateInstance
CoUninitialize
CoInitialize
SysFreeString
LoadTypeLi
VarR8FromStr
RegisterTypeLi
SysAllocStringLen
PathFindFileNameA
PathGetArgsA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ