Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
a789e7b1bd205eaa7b5209cfd0d429dc_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a789e7b1bd205eaa7b5209cfd0d429dc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a789e7b1bd205eaa7b5209cfd0d429dc_JaffaCakes118
Size
277KB
MD5
a789e7b1bd205eaa7b5209cfd0d429dc
SHA1
d98c370ee7f8824562cdd6d372e544b2a2756665
SHA256
bf47b78aac646cab624e75a159426d3c0ec722dc5c88388d07db23162e67d532
SHA512
f4d7d5e21af7e653761dff46241c8db8d4986070fad58e9ca07439a3b5af5c239ce1a43ff2ac76f358e3320173949ac6e0009ceca80f56c6a2dcc23921947b60
SSDEEP
6144:+uNpTSlDD8MWeYjMZYm0TfiAG6HCoYT2QyKoU:Bt0tl/4fiA3Co5QyKoU
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
s:\src\TGC-1.0.6.347\client\Bin\Daemon\Daemon.pdb
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
OutputDebugStringA
FindNextFileA
GetModuleHandleA
Sleep
GetCurrentDirectoryA
GetVersionExA
FindClose
GetWindowsDirectoryA
GetPrivateProfileStringA
FindFirstFileA
LoadLibraryA
VirtualQuery
GetLastError
DeleteCriticalSection
lstrlenA
LeaveCriticalSection
GetPrivateProfileIntA
Module32Next
MultiByteToWideChar
SetCurrentDirectoryA
MapViewOfFile
Module32First
UnmapViewOfFile
GetDllDirectoryA
CreateToolhelp32Snapshot
SetDllDirectoryA
CloseHandle
EnterCriticalSection
InitializeCriticalSection
CreateFileMappingA
GetCurrentProcessId
GetProcAddress
GetCommandLineW
OutputDebugStringW
GetModuleFileNameW
WriteProcessMemory
GetModuleHandleW
GetProcessHeap
TerminateProcess
VirtualAllocEx
CreateEventW
SearchPathW
SetErrorMode
CreateProcessW
HeapAlloc
GetCurrentThreadId
SetUnhandledExceptionFilter
DuplicateHandle
GetCurrentProcess
HeapFree
WaitForSingleObject
CreateThread
CreateMutexA
GetExitCodeProcess
CreateProcessA
GetModuleFileNameA
GetLongPathNameA
SetLastError
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetFileAttributesA
UnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
HeapSize
ExitProcess
WriteFile
ReadFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
CreateFileA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
SetEndOfFile
SleepEx
SetCursor
ClipCursor
CreateWindowExA
IsWindow
SetWindowLongA
PostQuitMessage
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
ShellExecuteA
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
recv
select
__WSAFDIsSet
send
closesocket
connect
inet_ntoa
gethostbyname
ioctlsocket
socket
WSACleanup
WSAStartup
htons
WSAGetLastError
inet_addr
daemon_log
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ