Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
f9ebf6aeb3f0fb0c29bd8f3d652476cd1fe8bd9a0c11cb15c43de33bbce0bf68.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f9ebf6aeb3f0fb0c29bd8f3d652476cd1fe8bd9a0c11cb15c43de33bbce0bf68.exe
Resource
win10v2004-20240802-en
Target
a5760616299ec1df00dfdd12ad7a6464_JaffaCakes118
Size
53KB
MD5
a5760616299ec1df00dfdd12ad7a6464
SHA1
869c70ead0fa42886c855b347b4e50651f17408c
SHA256
c387ba7206a51850702f78550f092aeaa9b5f74d715c391f4d23bbba07d9bb66
SHA512
f608ab5b3ce39ece59005a964732cfa63a7e010237d45e9d53b6bccff4c57b3b488315097fff01780a3cdc118d843af200c9954b2cc621aeed2b4098e3b68b2f
SSDEEP
768:/C6tPnWyHp1GNiC1W3k/LPderO5JyUgaoyzNP9T3YO1UyU/sEcMeX0wypzgs9B:aByT+11/7ghaxzX3PlwPcMeX0wEzB
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\bld_area\SNAC_11.0-MR4\Symantec_Network_Access_Control\Agent\Windows\src\bin.ira\dot1xtray.pdb
LocalFree
GetCurrentProcess
GetCurrentThread
SetLastError
LocalAlloc
WriteFile
WaitForMultipleObjectsEx
Sleep
ReadFile
GetOverlappedResult
DisconnectNamedPipe
FlushFileBuffers
ResetEvent
CancelIo
DuplicateHandle
ConnectNamedPipe
GetTickCount
CreateNamedPipeW
GetVersionExW
HeapSize
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
RtlUnwind
InitializeCriticalSection
LoadLibraryW
FreeLibrary
CreateEventW
CreateThread
ResumeThread
GetModuleHandleW
OutputDebugStringW
GetProcAddress
GetWindowsDirectoryW
GetLastError
CloseHandle
SleepEx
GetCurrentThreadId
SetEvent
OpenEventW
WaitForMultipleObjects
GetStartupInfoW
ExitThread
CreateFileA
GetConsoleMode
GetConsoleCP
HeapAlloc
HeapFree
MultiByteToWideChar
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
GetModuleHandleA
ExitProcess
GetStdHandle
GetModuleFileNameA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
SendMessageW
DestroyIcon
LoadImageW
SetWindowsHookExW
PostMessageW
DispatchMessageW
UnhookWindowsHookEx
RegisterClassW
SetForegroundWindow
UpdateWindow
CallNextHookEx
EndPaint
FindWindowW
DestroyWindow
ShowWindow
BeginPaint
DefWindowProcW
GetMessageW
PostQuitMessage
CreateWindowExW
LoadIconW
UnregisterClassW
LoadCursorW
GetSecurityInfo
AllocateAndInitializeSid
InitializeAcl
SetSecurityDescriptorDacl
AddAccessDeniedAce
InitializeSecurityDescriptor
GetLengthSid
IsValidSecurityDescriptor
FreeSid
IsValidSid
AddAccessAllowedAce
Shell_NotifyIconW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ