Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
b9f9b470701271e3ac47a49530b631cb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9f9b470701271e3ac47a49530b631cb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b9f9b470701271e3ac47a49530b631cb_JaffaCakes118
Size
232KB
MD5
b9f9b470701271e3ac47a49530b631cb
SHA1
83c0e05f41d04595023b1fb13fb68943de131a97
SHA256
633bebf70658388cece0d7b7067d18409b5036026aa86f22db4d781c89044922
SHA512
62ea8dd1a27a752474d643a3e7bbb06a3f37049f1a78287778dba1c6b18343bd39a0c8007258b154bb48ef9cd58fe5045cf1d735915128e7fe7c61efc0a25fac
SSDEEP
3072:PYeCH7McSqqJQjtuB1URTJp6L6Dx6VveMQgYI/L8zMp3cKAArDZz4N9GhbkUNEkw:vCnqJQYU68wee3pxyN90vE4C5
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
t:\setupexe\x86\ship\0\deployca\odeploy.pdb
CloseServiceHandle
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
RegOpenKeyExW
RegCreateKeyExW
FreeSid
AllocateAndInitializeSid
ImpersonateLoggedOnUser
RevertToSelf
CreateProcessAsUserW
RegFlushKey
RegCloseKey
WaitForSingleObject
GetTickCount
CreateFileW
GetLastError
SleepEx
CompareFileTime
GetSystemTimeAsFileTime
SetErrorMode
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
LoadLibraryA
InitializeCriticalSection
Sleep
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapSize
MultiByteToWideChar
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
GetTimeZoneInformation
CreateFileA
CloseHandle
CompareStringA
CompareStringW
SystemTimeToTzSpecificLocalTime
GetSystemTime
GetVersion
ExpandEnvironmentStringsW
LocalFree
FormatMessageW
FindClose
FindFirstFileW
lstrlenA
GetFileAttributesW
SetFileAttributesW
DeleteFileW
GetExitCodeProcess
GetModuleFileNameW
CreateProcessW
GetPriorityClass
GetTempPathW
GetModuleHandleW
OpenMutexW
GetCommandLineW
GlobalFree
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
CoInitializeEx
CoUninitialize
SHCreateDirectoryExW
CommandLineToArgvW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ord177
GetUserNameExW
SymGetLineFromAddr64
SymInitialize
SymGetSymFromAddr64
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE