Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
CASPER_SE_X86_SETUP_5_0_1294.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CASPER_SE_X86_SETUP_5_0_1294.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240802-en
Target
fc389984a76c46a6da2d8249f45ff0bc_JaffaCakes118
Size
3.7MB
MD5
fc389984a76c46a6da2d8249f45ff0bc
SHA1
1c87bc3f944de3d64ddd0a2cbed921c1cb2635b2
SHA256
f2d3b79db3466ed1df975fc70f6147d66c7b2dc87b1c92d57de9088d832a2185
SHA512
13cd0a6edce378a03a607c3b934a8e3656fbb93af42d0536300cc7f627d43d1dd2e113047f089d9c8d22473fa0213d93841db7e7885c5ffc0505a6461ad39f43
SSDEEP
49152:RhoZE1KECvEUTZkulM1NEjOh2kbddVA40Do5S7Piao1B2vATfL1IFCbrnvJDv8rt:RS21KB8MqVbdTR5OPCB0Uxy8rZv88wAY
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
SetFilePointer
GetFileSize
DeleteFileA
MoveFileA
WriteFile
ResetEvent
Sleep
LoadLibraryA
GetProcAddress
GetModuleFileNameA
RaiseException
DeleteCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapFree
FindClose
CreateDirectoryA
RemoveDirectoryA
FormatMessageA
FindFirstFileA
ReadFile
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetEnvironmentVariableA
GetLogicalDriveStringsA
GetDriveTypeA
GetTempFileNameA
FindNextFileA
lstrlenA
lstrcmpA
MulDiv
CreateFileA
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
SizeofResource
HeapAlloc
FlushFileBuffers
GetDiskFreeSpaceA
GetModuleHandleA
GetExitCodeProcess
GetVersion
GetPrivateProfileStringA
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcmpiA
CreateProcessA
GetFileAttributesA
SetFileAttributesA
CopyFileA
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
MultiByteToWideChar
lstrlenW
DebugBreak
HeapSize
HeapReAlloc
HeapDestroy
LocalAlloc
ExitProcess
GetStartupInfoA
GetCommandLineA
FindResourceExA
LoadResource
GetCurrentThreadId
LockResource
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrcatA
lstrcpyA
VirtualProtect
FindResourceA
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
CreateEventA
SetEvent
GetExitCodeThread
WaitForSingleObject
GetLastError
CreateThread
CloseHandle
FreeLibrary
VirtualAlloc
GetSystemInfo
VirtualQuery
EnterCriticalSection
RtlUnwind
SetClipboardData
CreateDialogParamA
PostQuitMessage
GetPropA
SetFocus
LoadIconA
DefWindowProcA
CallWindowProcA
GetSystemMetrics
EmptyClipboard
DialogBoxParamA
InvalidateRect
LoadMenuA
ShowWindow
CreateWindowExA
DestroyWindow
RemovePropA
SetPropA
IsWindow
PostMessageA
MessageBoxA
KillTimer
EnableWindow
SetTimer
CloseClipboard
OpenClipboard
ScreenToClient
DestroyMenu
EnableMenuItem
LoadImageA
GetSubMenu
GetActiveWindow
LoadStringA
SetWindowLongA
SendMessageA
EndDialog
GetWindowLongA
GetWindow
TrackPopupMenu
RedrawWindow
IsDialogMessageA
SystemParametersInfoA
GetWindowRect
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
GetDlgItem
UnregisterClassA
CharNextA
GetDesktopWindow
IsWindowVisible
wvsprintfA
SetWindowTextA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyA
RegQueryValueExA
ShellExecuteA
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHBrowseForFolderA
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
VarUI4FromStr
DestroyPropertySheetPage
CreatePropertySheetPageA
PropertySheetA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ