Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
a84a63727962ffd594bf20149c67f5c4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a84a63727962ffd594bf20149c67f5c4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a84a63727962ffd594bf20149c67f5c4_JaffaCakes118
Size
373KB
MD5
a84a63727962ffd594bf20149c67f5c4
SHA1
7414f0378e62d78ab0b528b23b638a3ac9d66d39
SHA256
7287b899d61798c58e4dd8648d8a14b282941efe9166179a8f38803428821985
SHA512
f40e6e408725d7b2d9be9881588bf20cf2821d367f56f1d192fb7774ff7ed0fcb59f7ea5528a13102b508bd4f6cc9c9c8b3aa2ac704ca1779c998cffc7b2ebf5
SSDEEP
3072:h4YatEN1I+rTNQYkdP8xOpRqcRdEjXzCa+jDEZ/5MGfj+SCeNRQ/pNaIgkXHRJd/:hlsEXrYP0OpafTCeNRQRIIfXR8gDLv
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\build\source\converter\rel32\RealConverter.pdb
OleInitialize
OleUninitialize
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersionExA
DeleteFileA
CreateFileA
GetModuleFileNameA
GetFileAttributesA
CreateDirectoryA
MoveFileA
GetTickCount
GetSystemInfo
GetVersion
SetEnvironmentVariableA
GetEnvironmentVariableA
GetCurrentProcessId
GetCurrentThreadId
Sleep
WaitForSingleObject
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
ResetEvent
InitializeCriticalSection
CreateEventA
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
SetCurrentDirectoryA
GetCurrentDirectoryA
IsBadWritePtr
VirtualProtect
IsBadReadPtr
GetModuleHandleA
SetUnhandledExceptionFilter
TerminateThread
CreateThread
GetCurrentProcess
WriteFile
GetThreadContext
VirtualQuery
OpenProcess
SetFilePointer
GlobalMemoryStatus
TerminateProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
SetErrorMode
InterlockedIncrement
CreateMutexA
CloseHandle
ReleaseMutex
lstrlenW
WideCharToMultiByte
GlobalAlloc
GlobalLock
lstrcpynA
GlobalUnlock
GlobalFree
WinExec
GetLastError
RaiseException
IsDebuggerPresent
SetEvent
UnhandledExceptionFilter
GetDC
ReleaseDC
GetWindowPlacement
SystemParametersInfoA
IsIconic
ShowWindow
SetForegroundWindow
GetForegroundWindow
AttachThreadInput
FlashWindow
GetWindowThreadProcessId
CharNextA
GetSystemMetrics
PostMessageA
IsWindow
FindWindowA
FindWindowExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegOpenKeyExA
RegDeleteValueA
RegQueryValueA
RegSetValueA
RegCreateKeyA
RegDeleteKeyA
RegEnumKeyA
RegEnumKeyExA
GetFileVersionInfoA
VerQueryValueA
GetDeviceCaps
SHGetFolderPathA
PathAddBackslashA
PathAppendA
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
asctime
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler4_common
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
_putenv
_crt_debugger_hook
printf
_XcptFilter
vsprintf
_time32
_gmtime32
memmove_s
memcpy_s
??3@YAXPAX@Z
free
calloc
_recalloc
??2@YAPAXI@Z
memcpy
getenv
_stat32
strchr
memset
strrchr
strstr
_ismbblead
strncpy
_purecall
sprintf
memmove
??_V@YAXPAX@Z
??_U@YAPAXI@Z
_vsnprintf
_stricmp
malloc
realloc
_ismbcspace
atoi
strnlen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE