Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
d10eaaf4e4d83c3d86ab73b8a3fade30_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d10eaaf4e4d83c3d86ab73b8a3fade30_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d10eaaf4e4d83c3d86ab73b8a3fade30_JaffaCakes118
Size
4.3MB
MD5
d10eaaf4e4d83c3d86ab73b8a3fade30
SHA1
460991d7159697ab5ae34d0c181b21fb39b9453a
SHA256
7524dd39597cccfe0afeb53fe28c27fe5beb612cdeb783cafe86988c644dc3a0
SHA512
769be478f4774a6c394c60d859340bac9cdc2c21595ce0a089cf06b45b0bf641f768d7c4159c9fc692b51cb60181f9465dbe68df4d74df0ab3ef0a6525f9bf45
SSDEEP
98304:Np87jdVojC8HsdKtbl3eRtczAdYA0XofdQfn57mhn74qQk54:NO8HqKt9eRtc60Ylqn24qQk54
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageKeyEncipherment
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Jenkins\workspace\SelfExtractable-OM711\Release\SelfExtractable.pdb
UuidToStringW
UuidCreate
CryptQueryObject
SizeofResource
CreateProcessA
GetStartupInfoW
GetStartupInfoA
GetProcAddress
LockResource
CloseHandle
FindFirstVolumeW
GetVolumeInformationW
LoadLibraryExW
InterlockedIncrement
GlobalLock
SetEvent
InitializeCriticalSection
GlobalAlloc
LeaveCriticalSection
MulDiv
GetModuleFileNameW
MultiByteToWideChar
lstrlenW
GlobalUnlock
RaiseException
GetLastError
EnterCriticalSection
CreateEventW
lstrcmpiW
DeleteCriticalSection
GetEnvironmentVariableW
SetFileAttributesW
FormatMessageW
GetLogicalDriveStringsW
Sleep
GetFileSize
FindFirstFileW
GetCurrentProcess
GetModuleHandleW
GetExitCodeProcess
CreateFileW
GetTempPathW
FindClose
RemoveDirectoryW
FindNextFileW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
lstrlenA
CreateFileA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetProcessHeap
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LoadLibraryA
GetFullPathNameW
LoadLibraryW
InterlockedDecrement
GetModuleHandleA
CreateProcessW
LoadResource
FreeLibrary
FindResourceW
FindVolumeClose
GetFileAttributesW
GetVersionExW
WaitForSingleObject
QueryPerformanceCounter
GetTickCount
LocalFree
GetLocaleInfoA
FlushFileBuffers
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
ReadFile
LCMapStringA
HeapSize
GetFileAttributesA
HeapFree
HeapAlloc
CreateDirectoryW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetEnvironmentVariableW
GetCurrentDirectoryW
SetCurrentDirectoryW
WideCharToMultiByte
GetSystemTimeAsFileTime
DeleteFileW
GetCommandLineA
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringW
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
SetFilePointer
SetHandleCount
GetFileType
GetCurrentProcessId
DialogBoxParamW
SetWindowTextW
SendMessageW
SetDlgItemTextW
MessageBoxW
ShowWindow
EndDialog
GetDlgItem
ExitWindowsEx
EndPaint
PostQuitMessage
CharNextW
LoadImageW
DestroyIcon
SetFocus
BeginPaint
GetDC
GetWindowLongW
ReleaseDC
GetDeviceCaps
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegSetValueExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
CoSetProxyBlanket
CoInitializeEx
CoTaskMemRealloc
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
VarUI4FromStr
OleLoadPicture
SysFreeString
VariantInit
VariantClear
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ