Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
c98b55ae1919646e0b511eba9d551b3b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c98b55ae1919646e0b511eba9d551b3b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
c98b55ae1919646e0b511eba9d551b3b_JaffaCakes118
Size
50KB
MD5
c98b55ae1919646e0b511eba9d551b3b
SHA1
2429883a0f8e0a620c649687629aabc87bb75c8f
SHA256
ac75a8f627dbf81b56ef7f651ca5490890fcaa0c264dd98d663eb3162edd9a9f
SHA512
bb59020653cda8548e21d8d7f42dab86335e71a779705ab673bd2e7b882ac0f84b49a2e97b355e32c1d72b8a4aef09dbd4f862c7a9877b3a7236b4b19ea18d92
SSDEEP
1536:mZCZVbXQD6NuqKZ85+A/hebOnabp1htsqka6C+:mZCZZEaeuJgbpftTlI
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
u:\users\dmitry\projects\myutil\raddrv\mini\rsetup\objfre_wnet_x86\i386\rsetup.pdb
RegCloseKey
RegOpenKeyA
RegDeleteValueA
CloseServiceHandle
OpenServiceW
OpenSCManagerW
ChangeServiceConfigW
StartServiceA
QueryServiceStatus
ControlService
DeleteService
RegSetValueExA
RegCreateKeyA
CreateServiceW
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
AddAccessAllowedAce
IsValidSid
GetLengthSid
InitializeAcl
InitializeSecurityDescriptor
RegSetKeySecurity
RegOpenKeyExA
RegEnumKeyExA
CloseHandle
GetProcAddress
GetModuleHandleA
GetVersionExA
GetVersion
LoadLibraryA
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
GetModuleFileNameW
GetLastError
FreeLibrary
GetLocaleInfoA
WriteFile
SetFilePointer
GetCommandLineW
TerminateProcess
GetCurrentProcess
LeaveCriticalSection
OpenProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
HeapReAlloc
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
VirtualQuery
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
VirtualProtect
GetSystemInfo
FlushFileBuffers
EnterCriticalSection
DeleteCriticalSection
Sleep
InterlockedExchange
InitializeCriticalSection
GetCurrentProcessId
ShellExecuteW
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ