Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
bdfe8766ae695a0ad6d1e8906f3ebd86_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bdfe8766ae695a0ad6d1e8906f3ebd86_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
bdfe8766ae695a0ad6d1e8906f3ebd86_JaffaCakes118
Size
863KB
MD5
bdfe8766ae695a0ad6d1e8906f3ebd86
SHA1
3d967be11a75bbb7fb341b85a1dbba79026d25a3
SHA256
f511df905f59ed4b80555b9665437151be07904085d389f8e74abedd14fde69d
SHA512
a5d8be869ebe26c489999ebc253679f964742478aa756b42652444faf12eb34a22c1e5ea2d7e6379d9fb124823100ba949af8d9d66f3c69859f32a9930eddbe7
SSDEEP
24576:yiXeuPLbN0JZ56H7PvXiZiyjT1ha9fhz3UN2:+oNIobniZpha9fqN2
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
F:\liebao_src_pool\release.b57_stable_8003\src_import\build\release\dbginfo\klbupd.pdb
CreateEnvironmentBlock
DestroyEnvironmentBlock
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
gethostbyname
bind
inet_ntoa
ioctlsocket
select
__WSAFDIsSet
WSASetLastError
setsockopt
ntohs
htons
getsockopt
getsockname
connect
inet_addr
send
recv
WSAGetLastError
WSACleanup
closesocket
socket
ntohl
WSAStartup
GetModuleFileNameExW
timeGetTime
SHGetValueW
SHSetValueW
PathFileExistsW
PathRemoveBackslashW
PathRemoveFileSpecW
PathAddBackslashW
PathAppendW
StrCmpNIW
PathRemoveExtensionW
IcmpCloseHandle
IcmpSendEcho
IcmpCreateFile
GetNetworkParams
GetLocaleInfoW
LCMapStringW
CompareStringW
InterlockedExchange
GetACP
GetLocaleInfoA
GetStringTypeW
GetVersionExA
RtlUnwind
LoadLibraryExW
ExitProcess
SetConsoleCtrlHandler
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
HeapDestroy
GetThreadLocale
GetCPInfo
GetVolumeInformationW
lstrlenW
lstrlenA
GetSystemDirectoryW
MultiByteToWideChar
GetLastError
GetDiskFreeSpaceExW
GetLocalTime
WideCharToMultiByte
GetComputerNameA
RaiseException
ReadFile
WriteFile
SetFilePointer
CreateFileW
CloseHandle
GetFileSize
GetVersionExW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ReleaseSemaphore
InitializeCriticalSection
WaitForSingleObject
CreateEventW
SetEvent
ResetEvent
LocalAlloc
LocalFree
FlushFileBuffers
GetProcAddress
GetModuleHandleW
GetCurrentProcess
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
GetLogicalDriveStringsW
QueryDosDeviceW
OpenProcess
LoadLibraryW
FreeLibrary
ExpandEnvironmentStringsW
ReadProcessMemory
CreateToolhelp32Snapshot
Process32FirstW
Module32FirstW
Module32NextW
Process32NextW
TerminateProcess
TerminateThread
CreateThread
Sleep
GetWindowsDirectoryW
GetTickCount
GetPrivateProfileIntW
GetPrivateProfileStringW
OpenEventW
ExitThread
InitializeCriticalSectionAndSpinCount
GetSystemInfo
FileTimeToSystemTime
GetModuleFileNameW
GetUserDefaultLangID
CreateProcessW
HeapAlloc
GetProcessHeap
HeapFree
DeleteFileW
GetCurrentProcessId
GetCommandLineW
CreateMutexW
SetFileAttributesW
CopyFileW
MoveFileExW
CreatePipe
GetStartupInfoW
MoveFileW
FreeResource
GetCurrentThreadId
GetFileAttributesW
CreateDirectoryW
WaitForMultipleObjects
FindFirstFileW
FindNextFileW
FindClose
GetExitCodeThread
SetErrorMode
GetCurrentDirectoryW
RemoveDirectoryW
GetTempPathW
SetLastError
SleepEx
DuplicateHandle
ReleaseMutex
FormatMessageW
GetFileAttributesExW
FindFirstFileExW
SetHandleInformation
GetStdHandle
AssignProcessToJobObject
ResumeThread
FreeLibraryAndExitThread
GetExitCodeProcess
SetEndOfFile
SetFilePointerEx
QueryPerformanceFrequency
SystemTimeToTzSpecificLocalTime
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetProcessId
HeapReAlloc
HeapSize
IsDebuggerPresent
GetNativeSystemInfo
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
SetEnvironmentVariableW
GetEnvironmentVariableW
GetModuleHandleExW
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
GetDriveTypeW
GetFileType
PeekNamedPipe
GetFullPathNameW
SetStdHandle
GetConsoleCP
GetConsoleMode
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadConsoleW
GetTimeZoneInformation
WriteConsoleW
DecodePointer
EncodePointer
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
UnregisterClassA
wsprintfW
GetSystemMetrics
GetWindowThreadProcessId
ExitWindowsEx
IsWindowVisible
EnumWindows
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegOpenKeyW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
CreateProcessAsUserW
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
DuplicateTokenEx
SetTokenInformation
IsValidSid
RegOpenKeyExA
RegQueryValueExA
OpenServiceW
StartServiceW
OpenSCManagerW
CloseServiceHandle
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
RegOpenKeyExW
SHGetFolderPathW
CoTaskMemAlloc
CoTaskMemFree
CoCreateGuid
VariantTimeToSystemTime
SystemTimeToVariantTime
WTSFreeMemory
WTSEnumerateSessionsW
GetHandleVerifier
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ