Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
a57e90de002b8a3c29a048106904a8ae_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a57e90de002b8a3c29a048106904a8ae_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a57e90de002b8a3c29a048106904a8ae_JaffaCakes118
Size
246KB
MD5
a57e90de002b8a3c29a048106904a8ae
SHA1
63e6d6cc2ba4a3dadeddec421c478eff5e112a2d
SHA256
3b78b353c09fa3b676f8115b23af940eec3cfb41e242e07d2c089920ad358d00
SHA512
24a7090cb03228849978c7dfe2717bdc3e5fb6d16ef09679ca1cdede6e6525b824774d94ee71893dff85926d82d6af501b7fe1d5808bfad1af346b636479cfa7
SSDEEP
6144:itCG1f7lLw66cfb/PnQXLRYCbE7bBA3xA09bM/vOAt9PLCcsE:itCU7dbVfTPnQXLKWE7bBAVFM/fGcP
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
F:\views\hummerbuilder_QQProj_int_144\Basic_Hummer5_VOB\Hummer5\Source\Tools\OpenUrl\Release\QQUrlMgr.pdb
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetProcessImageFileNameW
GetModuleHandleW
SetErrorMode
GetProcAddress
InitializeCriticalSection
WriteProcessMemory
SetUnhandledExceptionFilter
GetCurrentProcess
HeapFree
CreateToolhelp32Snapshot
Thread32First
Thread32Next
OpenThread
SuspendThread
EnterCriticalSection
CreateEventW
DuplicateHandle
SearchPathW
CreateProcessW
WaitForMultipleObjects
TerminateProcess
ReadProcessMemory
VirtualAllocEx
GetTickCount
GetPrivateProfileStringW
lstrlenW
MultiByteToWideChar
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
WideCharToMultiByte
OpenEventW
SetEvent
FreeLibrary
MoveFileExW
FindFirstFileW
FindNextFileW
GetCurrentThreadId
WaitForSingleObject
ConnectNamedPipe
CreateNamedPipeW
WaitNamedPipeW
TerminateThread
ReadFile
DisconnectNamedPipe
GetLastError
GetLocalTime
LocalFree
CreateThread
GetFileAttributesW
WritePrivateProfileStringW
GetSystemInfo
ExpandEnvironmentStringsW
FindFirstFileA
GetPrivateProfileStringA
GetModuleFileNameA
FindNextFileA
SetHandleInformation
CreateProcessA
CreatePipe
LoadLibraryW
GetTempPathW
GetFileSize
CreateDirectoryW
RemoveDirectoryW
InterlockedIncrement
InterlockedDecrement
DecodePointer
InterlockedExchange
InterlockedCompareExchange
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
GetModuleFileNameW
GetProcessHeap
HeapAlloc
CloseHandle
Sleep
WriteFile
CreateFileW
SetFileAttributesW
DeleteFileW
EncodePointer
DeleteCriticalSection
HeapDestroy
HeapReAlloc
HeapSize
RaiseException
LeaveCriticalSection
FindClose
IsWindow
SendMessageTimeoutW
KillTimer
PostQuitMessage
FindWindowW
GetMessageW
SetTimer
PostThreadMessageW
TranslateMessage
RegQueryInfoKeyW
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
FreeSid
SetEntriesInAclW
ConvertStringSecurityDescriptorToSecurityDescriptorW
AllocateAndInitializeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteKeyW
RegQueryValueExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueA
RegOpenKeyExA
SHGetSpecialFolderPathW
ShellExecuteW
SHGetFolderPathW
SHGetFolderPathA
CoInitialize
CoUninitialize
wnsprintfA
PathFileExistsA
SHGetValueA
wnsprintfW
PathFindFileNameW
PathFileExistsW
InternetReadFile
InternetOpenW
InternetOpenUrlW
HttpQueryInfoW
InternetCloseHandle
InternetGetConnectedState
wcsncmp
_controlfp_s
_invoke_watson
_except_handler4_common
__CxxFrameHandler3
memcpy
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
_stricmp
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
??3@YAXPAX@Z
malloc
free
memcpy_s
wcscpy_s
wcscat_s
_snwprintf
memmove_s
_wcslwr_s
wcsnlen
wmemcpy_s
_vscwprintf
vswprintf_s
??_U@YAPAXI@Z
wcsncpy_s
_wtol
??_V@YAXPAX@Z
_wcsicmp
wcsstr
fwprintf
calloc
_wfopen
_purecall
fclose
??2@YAPAXI@Z
rand
srand
_wtoi
sscanf_s
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
memmove
atoi
vsprintf_s
strrchr
_CxxThrowException
strcat_s
_wcslwr
wcsrchr
isspace
tolower
_vsnprintf_s
fprintf
strncmp
strchr
isalnum
isalpha
atol
memset
_unlock
__dllonexit
_lock
_onexit
_amsg_exit
__wgetmainargs
_cexit
_exit
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
ntohl
htonl
URLDownloadToFileW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.