Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
c91efaa99a5d9c51dfe86ea286fab519_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c91efaa99a5d9c51dfe86ea286fab519_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
c91efaa99a5d9c51dfe86ea286fab519_JaffaCakes118
Size
309KB
MD5
c91efaa99a5d9c51dfe86ea286fab519
SHA1
b42ee531a714e3b1c015338a5362ec0bd0ee1ff5
SHA256
7581d381c073d2b67bf2b21f5878855183f9fddf935557021ee6d813b7dda802
SHA512
12a9b1072723f52e595d2a08611188e3dd96b7b7d19c49691dfde04c19d3b6732f91abc01278e5db23ccc6b708ea4858f54dd38b9eeea2e828cfa1a848d4f22c
SSDEEP
3072:66UhurfThhxxfNNRBaIjzj7OUgnxP2MKOc2OOpnumK2++Jr1Va7KgCLaZNxkV52:SunTx9RBaIjzeZnZOOb7lR2ia3qV
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
F:\Excalibur\Excalibur\Excalibur\bin\oSaberSvc.pdb
MultiByteToWideChar
WideCharToMultiByte
CreateProcessW
GetFileAttributesA
GetSystemDefaultLangID
GetFileAttributesW
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
TerminateProcess
Process32NextW
CreateThread
ProcessIdToSessionId
GetProcAddress
GetModuleHandleW
GetCurrentProcess
GlobalAlloc
DeviceIoControl
GlobalFree
GetVolumeInformationW
CopyFileW
SetEndOfFile
WriteConsoleW
WinExec
DeleteFileW
GetModuleFileNameW
GetTempFileNameW
GetEnvironmentVariableW
GetVersionExW
SetFileAttributesW
FindClose
SetFileTime
CreateDirectoryW
FindFirstFileW
CloseHandle
GetLastError
CreateFileW
ReadFile
WriteFile
SetFilePointer
Sleep
SetStdHandle
LoadLibraryW
OutputDebugStringW
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetCurrentThreadId
FlushFileBuffers
GetOEMCP
GetACP
IsValidCodePage
LoadLibraryExW
GetFileType
SetFilePointerEx
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetProcessHeap
GetStdHandle
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetStringTypeW
HeapFree
HeapAlloc
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineW
RaiseException
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
wsprintfW
RegisterServiceCtrlHandlerW
SetServiceStatus
DeleteService
ControlService
StartServiceW
QueryServiceStatus
OpenServiceW
CloseServiceHandle
ChangeServiceConfig2W
CreateServiceW
OpenSCManagerW
CreateProcessAsUserW
DuplicateTokenEx
LookupPrivilegeValueW
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
StartServiceCtrlDispatcherW
recv
inet_addr
gethostbyname
gethostname
connect
send
socket
ioctlsocket
htons
WSAStartup
WSACleanup
closesocket
PathAppendW
PathRemoveFileSpecW
InternetOpenUrlW
InternetOpenW
InternetCrackUrlW
HttpQueryInfoW
InternetReadFile
InternetConnectW
InternetCloseHandle
HttpOpenRequestW
HttpSendRequestW
CreateEnvironmentBlock
DestroyEnvironmentBlock
WTSFreeMemory
WTSQueryUserToken
WTSEnumerateSessionsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ