Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
c04d57371a10d37abee517f9b764801c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c04d57371a10d37abee517f9b764801c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
c04d57371a10d37abee517f9b764801c_JaffaCakes118
Size
239KB
MD5
c04d57371a10d37abee517f9b764801c
SHA1
c0ed478b5f6de0f67ef793d4a8775a11efe0aee6
SHA256
903a004ac48315a4fea7987ab54bbd8c705f5935e6b701f88bbb866530f23dcc
SHA512
92321c8157388e9d983ff89522f187488e9b3a6d715b5858c3e0fd741c505fc5f91f9e674afcf9f1d5e4c36f7bec906e552f91d82525aa5d6cb8d19524bf75e4
SSDEEP
3072:7CvDqCR2tJP8iHS+wCkAFAGHWZLf7iHyiUkveZjy4uj55Rv+EWp+2pA:7URehFRHWZLkpU1ZjKRZWp5A
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\Work\zugo-toolbar\ZTB_2.4\Components\ZugoBuild\Release\ToolbarUpdaterService.pdb
EnumProcesses
GetModuleBaseNameW
ProcessIdToSessionId
Process32NextW
HeapFree
GetProcessHeap
GetCurrentProcess
HeapAlloc
LocalFree
LocalAlloc
GetVersionExW
GetTempPathW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetFileAttributesW
FindFirstFileW
FindNextFileW
DeleteFileW
FindClose
CreateFileW
RemoveDirectoryW
CreateNamedPipeW
Process32FirstW
GetCurrentDirectoryW
ReadFile
DisconnectNamedPipe
WriteFile
EnterCriticalSection
LeaveCriticalSection
SetLastError
GetTickCount
CreateThread
TerminateThread
LCMapStringA
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
SetFilePointer
LoadLibraryA
InitializeCriticalSectionAndSpinCount
LCMapStringW
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
CreateToolhelp32Snapshot
WaitForSingleObject
WTSGetActiveConsoleSessionId
OpenProcess
CloseHandle
Sleep
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
LoadLibraryExW
MultiByteToWideChar
GetLastError
RaiseException
lstrcmpiW
GetModuleHandleW
GetProcAddress
lstrlenW
FreeLibrary
GetModuleHandleA
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
ConnectNamedPipe
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentThreadId
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapCreate
VirtualAlloc
VirtualFree
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
CreateDirectoryW
GetStartupInfoW
GetSystemTimeAsFileTime
HeapSize
HeapReAlloc
HeapDestroy
CharNextW
wsprintfW
DeleteService
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
AllocateAndInitializeSid
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
GetTokenInformation
AdjustTokenPrivileges
SetTokenInformation
LookupPrivilegeValueW
OpenProcessToken
CreateProcessAsUserW
DuplicateTokenEx
RegQueryValueExW
ControlService
StartServiceW
OpenServiceW
CloseServiceHandle
CreateServiceW
OpenSCManagerW
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
SysAllocString
VarUI4FromStr
SysFreeString
VariantInit
VariantClear
VariantChangeType
SysStringLen
VarBstrCat
VarBstrCmp
SysAllocStringLen
SysStringByteLen
SysAllocStringByteLen
URLDownloadToFileW
NetApiBufferFree
NetUserEnum
GetProfilesDirectoryW
DestroyEnvironmentBlock
CreateEnvironmentBlock
WTSQueryUserToken
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ