Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
d329fa54a95c61512bf857dcf517f9fd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d329fa54a95c61512bf857dcf517f9fd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d329fa54a95c61512bf857dcf517f9fd_JaffaCakes118
Size
14.5MB
MD5
d329fa54a95c61512bf857dcf517f9fd
SHA1
9efc6962eba7d237a590017df754542cca7b77d0
SHA256
86081349b8ae19da39505fa3621b4c364b914c4cec408e159b8dfbcfc1c4444a
SHA512
a7677bff45613b5ea4f76632e9ee579ee60266fabaff26bac8a86a60113a704e95d2c3630eef58e9b97138416db2cde4331b8d85a741136654683f8f212eed2f
SSDEEP
196608:3v9kucMe1RrlTme4vj39tg4FBG2Nhi59X6PS1AC03OkudkkS2atJ3ORZmr8dWDba:2rpTmLZtzFcKPB4VaYUfkENOwZGgm
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
f:\公司产品\万能安装和卸载\万能安装\WnInstall\WnInstall\Release\WnInstall.pdb
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetTimeZoneInformation
SetHandleCount
GetStdHandle
SetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
IsBadWritePtr
GetDriveTypeA
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
VirtualFree
HeapCreate
HeapDestroy
HeapSize
TerminateProcess
HeapReAlloc
GetCommandLineA
GetStartupInfoA
GetFileType
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
CreateThread
ExitThread
ExitProcess
RtlUnwind
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetCurrentDirectoryA
GetFileTime
GetFileAttributesA
SetErrorMode
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
RaiseException
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetFullPathNameA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
InterlockedDecrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
FreeResource
MulDiv
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
lstrcmpA
RemoveDirectoryA
lstrcpyA
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesA
GetTickCount
GlobalFree
GlobalAlloc
SetLastError
WritePrivateProfileStringA
GetVolumeInformationA
lstrcatA
GetCurrentThread
LocalAlloc
LocalFree
GetProcessHeap
HeapAlloc
GetModuleHandleA
HeapFree
CreateDirectoryA
GetCurrentProcess
LoadLibraryA
GetProcAddress
FreeLibrary
GetSystemDirectoryA
CopyFileA
MoveFileExA
GetExitCodeProcess
CreateFileA
DeviceIoControl
GetWindowsDirectoryA
GetTempPathA
DeleteFileA
GetPrivateProfileStringA
GetPrivateProfileIntA
FindResourceA
LoadResource
LockResource
SizeofResource
CreateProcessA
WaitForSingleObject
CloseHandle
InterlockedExchange
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetEnvironmentStringsW
DrawTextA
TabbedTextOutA
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
PostMessageA
GetSysColor
AdjustWindowRectEx
DrawTextExA
CharUpperA
DestroyMenu
GetSysColorBrush
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CopyRect
PtInRect
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CharNextA
ExitWindowsEx
GetSystemMetrics
LoadIconA
GrayStringA
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
PostQuitMessage
ValidateRect
GetClientRect
IsIconic
GetSystemMenu
DrawIcon
LoadCursorA
SetCursor
ClientToScreen
GetWindowRect
MessageBoxA
SendMessageA
EnableWindow
GetParent
GetCursorPos
TranslateMessage
GetMessageA
MapDialogRect
SetWindowContextHelpId
EqualRect
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
ReleaseCapture
GetMenu
SetCapture
wsprintfA
ExtSelectClipRgn
DeleteDC
GetStockObject
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateSolidBrush
CreateRectRgnIndirect
CreateFontA
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
ImpersonateSelf
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
SetFileSecurityA
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
EqualSid
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueExA
RegOpenKeyA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
LookupAccountNameA
GetFileSecurityA
ShellExecuteA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderPathA
ord17
ImageList_Destroy
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFileExistsA
PathFindFileNameA
ord8
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
StgOpenStorageOnILockBytes
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
SysFreeString
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
SystemTimeToVariantTime
SysAllocString
OleCreateFontIndirect
SysStringLen
ord21
ord23
ord22
ord20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ