Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
af8ac2a4307d949833cf26af5d958bdf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
af8ac2a4307d949833cf26af5d958bdf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
af8ac2a4307d949833cf26af5d958bdf_JaffaCakes118
Size
441KB
MD5
af8ac2a4307d949833cf26af5d958bdf
SHA1
0fede0997d3c5b9f1f70f99e42166e33e4c4ca15
SHA256
f8d11b1e3e027355a11163049b530de4fd67183abd08a691d5d18744653ef575
SHA512
6d69cadccfa1891141c4951a70ab2c2938d5a1345656bf6de0d479f5fc828d11f22cbb888596d25437ebf3e41576acfec52d2ebc481748306774ac472018cd9f
SSDEEP
6144:ZZmQiKD+jSaSIBRN1u49+BbE5VjPr6FkC+rfnsQg7zRQiV/R7f2tTBqHtSu:yKDJ3YaojD6FkC+rfns597f2tTsNb
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\src\trunk\client\BundleInstall\SmallStandalone\rkinstaller.pdb
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
InternetCloseHandle
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetGetConnectedState
HttpQueryInfoA
ord17
closesocket
shutdown
ioctlsocket
gethostbyname
setsockopt
socket
connect
send
WSAGetLastError
listen
WSAStartup
WSASetLastError
recv
select
__WSAFDIsSet
htons
bind
accept
GetStartupInfoA
GetCurrentProcess
OpenMutexA
GetSystemDirectoryA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrlenW
WideCharToMultiByte
GetModuleFileNameA
GetSystemTimeAsFileTime
Sleep
CreateDirectoryA
RemoveDirectoryA
SetEvent
OpenEventA
GetVolumeInformationA
GetVersionExA
GetWindowsDirectoryA
SetFileAttributesA
GetFileAttributesA
WriteFile
CopyFileA
WritePrivateProfileStringA
FreeLibrary
GetProcAddress
LoadLibraryA
WaitForSingleObject
CreateProcessA
lstrcmpiA
ReadFile
CompareFileTime
GetTimeZoneInformation
GetDiskFreeSpaceExA
GetDiskFreeSpaceA
GetModuleHandleA
FindClose
FindNextFileA
FindFirstFileA
GetTempPathA
HeapAlloc
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
GetLocalTime
OutputDebugStringA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapReAlloc
VirtualAlloc
FatalAppExitA
VirtualFree
HeapCreate
HeapDestroy
IsValidCodePage
GetOEMCP
GetACP
TlsAlloc
GetConsoleOutputCP
WriteConsoleA
GetStdHandle
SetHandleCount
SetStdHandle
CloseHandle
DeleteFileA
GetTickCount
GetStringTypeA
GetStringTypeW
SetConsoleCtrlHandler
SetEndOfFile
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLastError
GetTempFileNameA
HeapFree
CreateFileA
MoveFileExA
WriteConsoleW
CreateFileW
ExitProcess
HeapSize
GetCurrentThread
SetLastError
TlsGetValue
GetCPInfo
LCMapStringW
LCMapStringA
GetCommandLineA
CreateThread
GetCurrentThreadId
ExitThread
LocalFileTimeToFileTime
SetFileTime
TlsFree
TlsSetValue
OpenProcess
LocalAlloc
LocalFree
WaitForMultipleObjects
TryEnterCriticalSection
CreateEventA
ResetEvent
CreateMutexA
ReleaseMutex
CreateSemaphoreA
ReleaseSemaphore
CreateWaitableTimerA
CancelWaitableTimer
SetWaitableTimer
QueryPerformanceFrequency
QueryPerformanceCounter
SystemTimeToFileTime
FileTimeToSystemTime
GetDateFormatA
GetTimeFormatA
GetSystemTime
GetComputerNameA
GetVersion
GetPrivateProfileSectionA
WritePrivateProfileSectionA
FindFirstFileW
FindNextFileW
GetShortPathNameA
FormatMessageA
GetModuleFileNameW
LoadLibraryExA
MapViewOfFile
CreateFileMappingA
GetCurrentProcessId
UnmapViewOfFile
Process32Next
Process32First
CreateToolhelp32Snapshot
SetFilePointer
DeleteFileW
InterlockedExchange
InterlockedCompareExchange
MultiByteToWideChar
lstrlenA
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadImageA
GetSystemMetrics
LoadMenuA
KillTimer
GetClientRect
SetWindowTextA
PostMessageA
SetWindowPos
LoadStringA
PostQuitMessage
GetDesktopWindow
GetWindowRect
MoveWindow
DestroyWindow
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetForegroundWindow
ReleaseDC
GetDC
ExitWindowsEx
AdjustTokenPrivileges
LookupPrivilegeValueA
SetSecurityInfo
SetFileSecurityA
GetSidSubAuthorityCount
GetSidSubAuthority
IsValidSid
SetTokenInformation
GetLengthSid
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
AllocateAndInitializeSid
EqualSid
RegSetKeySecurity
RegDeleteKeyA
RegSaveKeyA
RegFlushKey
RegEnumKeyExA
RegCreateKeyExA
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
FreeSid
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegEnumKeyA
RegEnumValueA
RegCloseKey
OpenProcessToken
DuplicateTokenEx
CreateProcessAsUserA
GetTokenInformation
OleRun
CoCreateInstance
CoTaskMemFree
StringFromGUID2
OleInitialize
SysAllocString
SetErrorInfo
VariantChangeType
GetErrorInfo
LoadTypeLi
VariantClear
VariantInit
SysFreeString
DispGetIDsOfNames
CreateErrorInfo
SHCopyKeyA
GetDeviceCaps
SHGetSpecialFolderPathA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ