Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
a5674fa46ed7f0abd924bf27133af777_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a5674fa46ed7f0abd924bf27133af777_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a5674fa46ed7f0abd924bf27133af777_JaffaCakes118
Size
721KB
MD5
a5674fa46ed7f0abd924bf27133af777
SHA1
8f94edf045cddabf77040dedf91caa0c8b5a0867
SHA256
d1164187d93345afaf2661fd509a9d7eb9a1c4e7dd5a94e5b0d582dc1aef504b
SHA512
9e92c6aa25eda752bcbc67745f6d790a797369cdf1855029744675c53f097569e1fed9008399d90237930805c25f198bdbaca8e00876acd29b7d187139fb5962
SSDEEP
12288:m7UjrNdQ6nC/9h9W67mxhGxYSH47jetNabV8gae9ocOAGuK91fgh:F3NdQ6nyiqxYSQqabV8gahcOAGuK91fQ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
H:\Desarrollo\TFS\Installers\Products\CloudAv\Release\Version 3.02.00.xxxx\Source\Code\Projects\Setup.exe\ProjectWin\bin\Release\Setup.pdb
GetPrivateProfileIntW
FindResourceW
LoadResource
GetPrivateProfileStringW
Sleep
SizeofResource
WritePrivateProfileStringW
LockResource
SetEvent
WaitForMultipleObjectsEx
TerminateProcess
CreateEventW
LoadLibraryW
LoadLibraryA
LoadLibraryExA
FormatMessageA
LocalFree
MoveFileExW
WideCharToMultiByte
MultiByteToWideChar
GetDriveTypeW
GetFileAttributesW
SetLastError
GetModuleFileNameW
GetVersionExW
lstrcmpiW
GetVersionExA
CreateProcessW
OpenProcess
GlobalMemoryStatus
GetDiskFreeSpaceW
GetTickCount
CreateFileW
LocalAlloc
GetUserDefaultLangID
GetDateFormatW
OutputDebugStringW
GetTimeFormatW
GetLocalTime
GetCurrentThreadId
SetEndOfFile
WriteConsoleW
SetEnvironmentVariableW
CompareStringW
SetStdHandle
CopyFileW
CreateDirectoryW
GetCurrentProcess
FileTimeToLocalFileTime
FreeLibrary
FindNextFileW
FindClose
FileTimeToSystemTime
FindFirstFileW
CreateMutexW
GetCommandLineW
DeleteFileW
GetTempPathW
GetTempFileNameW
GetExitCodeProcess
GetModuleHandleW
CompareFileTime
ExpandEnvironmentStringsW
GetLastError
CloseHandle
ReleaseMutex
OpenMutexW
WaitForSingleObject
GetWindowsDirectoryW
GetCurrentDirectoryW
GetCurrentProcessId
DeleteCriticalSection
EnterCriticalSection
GetProcAddress
LeaveCriticalSection
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LoadLibraryExW
EncodePointer
DecodePointer
InterlockedExchange
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapSetInformation
GetStartupInfoW
HeapReAlloc
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetLocaleInfoW
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
QueryPerformanceCounter
FlushFileBuffers
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
GetProcessHeap
GetSystemMetrics
wsprintfW
MessageBoxA
ExitWindowsEx
MessageBoxW
LookupPrivilegeValueW
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptReleaseContext
CryptGetHashParam
FreeSid
ControlService
QueryServiceStatus
StartServiceW
OpenServiceW
OpenSCManagerW
DeleteService
CloseServiceHandle
CreateServiceW
RevertToSelf
ImpersonateLoggedOnUser
SetTokenInformation
CreateProcessAsUserW
GetTokenInformation
RegSetValueExW
RegEnumKeyExW
RegFlushKey
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ