Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
ab1e57cd1d9c93a43a2f9d22a9c7e833_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ab1e57cd1d9c93a43a2f9d22a9c7e833_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
ab1e57cd1d9c93a43a2f9d22a9c7e833_JaffaCakes118
Size
309KB
MD5
ab1e57cd1d9c93a43a2f9d22a9c7e833
SHA1
0f32d7db79a7fab60d2986aeda573264f6c188a2
SHA256
2d94ee2db3471f17a13fc44977c59ae175f3074457bdfcc4331d04eabe084d6c
SHA512
aad4bedfd1923ec593e1bca4cef8a7316cb1d3930612f78895a9a7885dec96805168fe085695cbed313296329640d4e66751b4dcf3775bd59b80a1e3088478b3
SSDEEP
6144:p4A0RpVsXRTYYZlH0LKGGw8uZwsry21b1r14ETR:2VshUGlDwZwQyIZ14E
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\Documents and Settings\Timothy\My Documents\WorkCode\PIE\trunk\release\PIEService.pdb
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
GetCPInfo
GetOEMCP
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
SetStdHandle
GetFileType
ExitProcess
RtlUnwind
RaiseException
ExitThread
CreateThread
HeapSize
GlobalGetAtomNameA
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetConsoleCP
GetConsoleMode
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GlobalFindAtomA
lstrcmpW
GetCurrentProcessId
GlobalAddAtomA
InterlockedIncrement
LocalReAlloc
GlobalHandle
GlobalReAlloc
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
LocalAlloc
SetEndOfFile
SetFilePointer
GetThreadLocale
CreateEventA
SetEvent
WaitForSingleObject
SetThreadPriority
GlobalFree
GlobalUnlock
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
HeapFree
GetProcessHeap
HeapAlloc
WritePrivateProfileStringA
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStdHandle
TerminateProcess
LocalFree
FormatMessageA
GetCurrentProcess
CreateNamedPipeA
GetModuleFileNameA
GetVersionExA
WriteFile
ReadFile
SetLastError
Sleep
VirtualFree
VirtualAlloc
LoadLibraryA
GetProcAddress
CreateFileA
FreeLibrary
lstrlenA
GetVersion
MultiByteToWideChar
InterlockedExchange
CompareStringA
ResumeThread
SuspendThread
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
DisconnectNamedPipe
FlushFileBuffers
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
CloseHandle
ConnectNamedPipe
GetLastError
GetModuleHandleA
GetCommandLineA
CreateFileW
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
RegisterWindowMessageA
GetSysColorBrush
LoadCursorA
UnregisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowThreadProcessId
GetLastActivePopup
EnableWindow
MessageBoxA
GetWindow
GetDlgCtrlID
GetWindowRect
GetWindowLongA
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
GetSysColor
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
SetCursor
SetMenuItemBitmaps
ShowWindow
DestroyMenu
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostMessageA
PostQuitMessage
GetSystemMetrics
DispatchMessageA
TranslateMessage
GetMessageA
IsWindowEnabled
CallWindowProcA
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
DeleteObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
PtVisible
DocumentPropertiesA
ClosePrinter
OpenPrinterA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
InitializeSecurityDescriptor
RegQueryValueExA
RegOpenKeyExA
GetSecurityDescriptorControl
IsValidSid
GetSecurityDescriptorLength
MakeSelfRelativeSD
GetLengthSid
GetSecurityDescriptorSacl
RegCloseKey
SetSecurityDescriptorDacl
LookupAccountNameA
GetSecurityDescriptorDacl
CopySid
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
GetSecurityInfo
GetAce
GetAclInformation
SetServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceCtrlDispatcherA
PathFindExtensionA
PathFindFileNameA
CoInitializeEx
CoUninitialize
VariantClear
VariantChangeType
VariantInit
inflate
inflateInit2_
inflateEnd
Tcl_SetResult
Tcl_DeleteClone
Tcl_CloneInterp
Tcl_CreateInterp
Tcl_ProcCmd
Tcl_GetStringResult
Tcl_FreeList
Tcl_EvalEx
Tcl_DeleteInterp
Tcl_CreateCommand
Tcl_SplitList
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ