Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
fc4ed00cfaefce50b46efdc167c918d3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc4ed00cfaefce50b46efdc167c918d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fc4ed00cfaefce50b46efdc167c918d3_JaffaCakes118
Size
309KB
MD5
fc4ed00cfaefce50b46efdc167c918d3
SHA1
a4654db4198ade6cb837287aeffa9f68d94fec57
SHA256
49c90bb0cd7f9622131935609f9d6c0b127a3c80c329573737477744ecf77561
SHA512
f55c84926b8ae9c4250dbbc830fc0dad171d16c83b1035933142225ea8a1a4c0c1df375ec748211adb17f411a594c177d22b93ef78b679e66dfc270449690d32
SSDEEP
6144:gL0RzcLMFx3Q2Eg7lwdLlJd+j1kfZWCHqcEeg:DUExg2XsdC1M0SqcE
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\Users\Matthew\WorkCode\PIE\trunk\release\PIEService.pdb
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
GetCPInfo
GetOEMCP
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
SetStdHandle
GetFileType
ExitProcess
RtlUnwind
RaiseException
ExitThread
CreateThread
HeapSize
GlobalGetAtomNameA
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetConsoleCP
GetConsoleMode
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GlobalFindAtomA
lstrcmpW
GetCurrentProcessId
GlobalAddAtomA
InterlockedIncrement
LocalReAlloc
GlobalHandle
GlobalReAlloc
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
LocalAlloc
SetEndOfFile
SetFilePointer
GetThreadLocale
CreateEventA
SetEvent
WaitForSingleObject
SetThreadPriority
GlobalFree
GlobalUnlock
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
WritePrivateProfileStringA
HeapFree
GetProcessHeap
HeapAlloc
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStdHandle
TerminateProcess
LocalFree
FormatMessageA
GetCurrentProcess
CreateNamedPipeA
GetModuleFileNameA
GetVersionExA
WriteFile
ReadFile
Sleep
VirtualFree
VirtualAlloc
LoadLibraryA
GetProcAddress
CreateFileA
FreeLibrary
SetLastError
lstrlenA
GetVersion
MultiByteToWideChar
InterlockedExchange
CompareStringA
ResumeThread
SuspendThread
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
DisconnectNamedPipe
FlushFileBuffers
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
CloseHandle
ConnectNamedPipe
GetLastError
GetModuleHandleA
GetCommandLineA
CreateFileW
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
RegisterWindowMessageA
GetSysColorBrush
LoadCursorA
UnregisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowThreadProcessId
GetLastActivePopup
EnableWindow
MessageBoxA
GetWindow
GetDlgCtrlID
GetWindowRect
GetWindowLongA
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
GetSysColor
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
SetCursor
SetMenuItemBitmaps
ShowWindow
DestroyMenu
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostMessageA
PostQuitMessage
GetSystemMetrics
DispatchMessageA
TranslateMessage
GetMessageA
IsWindowEnabled
CallWindowProcA
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
DeleteObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
PtVisible
DocumentPropertiesA
ClosePrinter
OpenPrinterA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
GetSecurityDescriptorControl
IsValidSid
GetSecurityDescriptorLength
MakeSelfRelativeSD
GetLengthSid
GetSecurityDescriptorSacl
RegCloseKey
SetSecurityDescriptorDacl
LookupAccountNameA
GetSecurityDescriptorDacl
CopySid
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
GetSecurityInfo
GetAce
GetAclInformation
InitializeSecurityDescriptor
RegQueryValueExA
SetServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceCtrlDispatcherA
PathFindExtensionA
PathFindFileNameA
CoUninitialize
CoInitializeEx
VariantClear
VariantChangeType
VariantInit
inflate
inflateInit2_
inflateEnd
Tcl_ProcCmd
Tcl_FreeList
Tcl_SplitList
Tcl_CreateCommand
Tcl_DeleteInterp
Tcl_CreateInterp
Tcl_EvalEx
Tcl_CloneInterp
Tcl_DeleteClone
Tcl_SetResult
Tcl_GetStringResult
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ