Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
fce2583a205e5f3d4d0a84e3653cce78_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fce2583a205e5f3d4d0a84e3653cce78_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fce2583a205e5f3d4d0a84e3653cce78_JaffaCakes118
Size
79KB
MD5
fce2583a205e5f3d4d0a84e3653cce78
SHA1
ea421381eb639d5af494c621e6021053fc83ccd4
SHA256
2c46599a0ecf980bf8b5181a5da7e60921bc80866c16513bab99ede8451abc78
SHA512
7b681cba92fdf1d6b68cb0fbd4388f422535f31f040d6d4efea44ea538c781ef702d88e4f4bd54a2d5fef6a63abef702d73870bdb5050fb4466df5fef11383aa
SSDEEP
768:t7u0pD6Wc19YGUp15VUP6mTFfM/jgzteNw9rTK9zsOd+EpsdGOv1RZrDy3EEjLZS:tq0mIu9EjrNK/szsa+m4G+Zvg9jLeFv
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\wk\YangGS_16-05-11_p2p_revert\code\KwResource\bin\Release\pdb\DumpReport.pdb
GetModuleHandleA
lstrcmpiA
MultiByteToWideChar
IsDBCSLeadByte
WideCharToMultiByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleFileNameA
LoadLibraryA
DecodePointer
SetLastError
CreateFileA
GetFileSize
CloseHandle
ReadFile
DeleteFileA
GetProcAddress
FindNextFileA
FindClose
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
EncodePointer
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetProcessHeap
HeapFree
HeapAlloc
OutputDebugStringW
IsDebuggerPresent
FreeLibrary
FlushInstructionCache
GetCurrentProcess
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
RaiseException
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FindFirstFileA
GetLastError
TranslateMessage
GetMessageA
PeekMessageA
DispatchMessageA
CreateDialogParamA
PostQuitMessage
GetWindowTextA
ShowWindow
DestroyWindow
GetParent
UnregisterClassA
SetWindowLongA
GetWindowLongA
DefWindowProcA
GetDlgItem
GetSystemMetrics
LoadImageA
GetWindow
MonitorFromWindow
GetMonitorInfoA
GetWindowRect
GetClientRect
MapWindowPoints
SetWindowPos
IsDialogMessageA
SendMessageA
CharNextA
RegDeleteKeyA
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
CoInitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
VarUI4FromStr
InitCommonControlsEx
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Winerror_map@std@@YAPBDH@Z
?_Syserror_map@std@@YAPBDH@Z
?_Xbad_alloc@std@@YAXXZ
??1ProcessExecutor@Process@KwLib@@QAE@XZ
?Exec@ProcessExecutor@Process@KwLib@@QAEHABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@_N@Z
?KillProcessByName@System@KwLib@@YAHABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@H@Z
??0ProcessExecutor@Process@KwLib@@QAE@XZ
?GetKwPath@Dir@KwLib@@YAHW4Path_Type@12@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z
?Base64Encode@Base64@KwLib@@YAHPADPBDH@Z
AfxGetConfigManager
?LogClientErrorMsg@@YAXABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@000@Z
?LogInit@@YAXABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z
?terminate@@YAXXZ
_except_handler3
_CxxThrowException
__crtTerminateProcess
__crtUnhandledException
_crt_debugger_hook
_controlfp_s
_invoke_watson
__crtSetUnhandledExceptionFilter
__CxxFrameHandler3
_except_handler4_common
_commode
_fmode
_acmdln
_initterm
_initterm_e
__setusermatherr
_configthreadlocale
_ismbblead
_cexit
??3@YAXPAX@Z
free
memmove
memcpy_s
??2@YAPAXI@Z
??_V@YAXPAX@Z
_recalloc
memmove_s
_mbsnbcpy_s
malloc
_resetstkoflw
_mbsstr
_purecall
memchr
calloc
memset
_lock
_unlock
_calloc_crt
__dllonexit
_onexit
??1type_info@@UAE@XZ
memcpy
_XcptFilter
__crtGetShowWindowMode
_amsg_exit
__getmainargs
__set_app_type
exit
_exit
AfxGetHttpRequestMgr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ