Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
dbc97c09ce17d0cf89f7144e6a0c8284_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dbc97c09ce17d0cf89f7144e6a0c8284_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
dbc97c09ce17d0cf89f7144e6a0c8284_JaffaCakes118
Size
97KB
MD5
dbc97c09ce17d0cf89f7144e6a0c8284
SHA1
94ae6de0b3b1a5a1b27cc57b2a83d3d956474d81
SHA256
62950fb65129d9794780e0654355d9a7a952ba6dc73d8755657b490c7cb76319
SHA512
df87ce63c7101cf2132978b77de7bfbd68c3c831c8909eb7b657b6c1f8eedf5f5f345a4b73585caafa58bdd5b7ff0c2fe56bb5de05b36bd1d3c04d577b954545
SSDEEP
1536:OPyr1w+BcfeVAS2Q7yhgEIpRhcTx1wp/+lvbuV8lczrRaL:kyr1wcDtANIdi06buV8lcvI
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
E:\su_combo\tvsu\Output\uacsdk.pdb
ReadFile
SetEndOfFile
WideCharToMultiByte
LCMapStringA
VirtualProtect
GetSystemInfo
GetProcessHeap
HeapAlloc
HeapFree
lstrlenA
WaitForSingleObject
SetConsoleCtrlHandler
GetCommandLineW
GetVersionExW
CopyFileW
DeleteFileW
lstrcmpW
FormatMessageW
GetLocalTime
GetCurrentProcessId
ProcessIdToSessionId
CreateFileW
SetFilePointer
WriteFile
GetLastError
SetLastError
lstrlenW
GetCurrentDirectoryW
CloseHandle
LocalAlloc
LocalFree
FreeLibrary
LoadLibraryW
GetProcAddress
LCMapStringW
GetCurrentProcess
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
InitializeCriticalSection
FlushFileBuffers
SetStdHandle
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
ExitProcess
RtlUnwind
GetModuleHandleA
GetStartupInfoW
GetVersionExA
RaiseException
TlsAlloc
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
EnterCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
GetTickCount
GetModuleFileNameA
InterlockedExchange
VirtualQuery
TerminateProcess
GetStdHandle
UnhandledExceptionFilter
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
HeapSize
SetUnhandledExceptionFilter
GetACP
wsprintfW
CloseDesktop
GetSystemMetrics
GetUserObjectSecurity
SetUserObjectSecurity
GetProcessWindowStation
OpenWindowStationW
SetProcessWindowStation
OpenDesktopW
CloseWindowStation
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
InitializeAcl
GetAce
AddAce
SetSecurityDescriptorDacl
LogonUserW
SetTokenInformation
LsaNtStatusToWinError
GetLengthSid
CopySid
DuplicateTokenEx
ImpersonateLoggedOnUser
CreateProcessAsUserW
RevertToSelf
RegQueryInfoKeyW
RegEnumKeyW
RegDeleteKeyW
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
LookupAccountNameW
RegCreateKeyW
RegQueryValueExW
GetTokenInformation
CreateWellKnownSid
LookupAccountSidW
RegDeleteValueW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
AddAccessAllowedAce
CommandLineToArgvW
NetUserAdd
NetLocalGroupAddMembers
NetApiBufferFree
NetUserGetInfo
NetUserDel
PathFileExistsW
CreateEnvironmentBlock
DeleteProfileW
DestroyEnvironmentBlock
LsaLogonUser
LsaRegisterLogonProcess
LsaFreeReturnBuffer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ