Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
fd7e0e5fbb72a1f5b1d11ad7067bf8ab_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd7e0e5fbb72a1f5b1d11ad7067bf8ab_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fd7e0e5fbb72a1f5b1d11ad7067bf8ab_JaffaCakes118
Size
252KB
MD5
fd7e0e5fbb72a1f5b1d11ad7067bf8ab
SHA1
0c6b59e2166131953532dc79d9d95744c4736764
SHA256
5260ab1812d9ef7f3a22981c50f114aa299e9ddb767d70510950ef3e46001a23
SHA512
c61bb15980e88617793678c029101c9cce998f1cc71c91253fddf1b7767fc8bfb771c41f5eab596738006e4697df9a82899babc575669a959715dfb677ff6c36
SSDEEP
3072:4TRerST7g9MfLrKnahaWAvOnZfNh8VZ1uF9hnQTBf/2NAP9UlNyJm5XRsuJb+xQ+:4TV/1LuahFIQVASF7QTBnO5BBd7
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
d:\PPStream-Vod-Work\XSearchNew\ppsvod\PPSAP\PPSAP\Release\PPSAP.pdb
GetCurrentThreadId
InterlockedDecrement
RaiseException
InterlockedIncrement
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
lstrcmpA
FlushFileBuffers
GetCurrentProcess
GetFullPathNameA
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
ExitProcess
RtlUnwind
ExitThread
CreateThread
TerminateProcess
GlobalGetAtomNameA
HeapFree
VirtualProtect
VirtualAlloc
GetTimeFormatA
GetDateFormatA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetCurrentProcessId
UnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetTimeZoneInformation
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetDriveTypeA
IsBadCodePtr
SetEnvironmentVariableA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
GetModuleHandleA
FileTimeToSystemTime
GlobalLock
GlobalUnlock
FormatMessageA
GetLongPathNameA
SetFileAttributesA
CopyFileA
GetPrivateProfileIntA
CreateProcessA
SetUnhandledExceptionFilter
IsBadReadPtr
VirtualQuery
GetFileTime
GetSystemTimeAsFileTime
GetSystemInfo
GlobalMemoryStatus
FileTimeToLocalFileTime
FileTimeToDosDateTime
WritePrivateProfileStringA
GetPrivateProfileStringA
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
LoadLibraryA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GlobalAlloc
GlobalFree
MultiByteToWideChar
lstrcpynA
LoadLibraryExA
GetProcAddress
FreeLibrary
GetTickCount
CreateFileA
FindFirstFileA
DeleteFileA
FindNextFileA
FindClose
RemoveDirectoryA
CreateDirectoryA
GetModuleFileNameA
LockFile
WriteFile
UnlockFile
ReadFile
GetFileSize
SetFilePointer
SetEndOfFile
GetFileAttributesA
lstrcpyA
LocalFree
LocalAlloc
lstrlenA
SetEvent
TerminateThread
SetLastError
GetExitCodeThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
WaitForSingleObject
Sleep
CreateEventA
GetLastError
CloseHandle
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
HeapAlloc
ValidateRect
ClientToScreen
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetDC
ReleaseDC
GetSysColorBrush
IsWindowEnabled
SetWindowTextA
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetDlgItem
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
GetKeyState
EnableWindow
SetForegroundWindow
GetClientRect
GetMenu
GetSysColor
AdjustWindowRectEx
GetParent
PostMessageA
DispatchMessageA
PeekMessageA
wsprintfA
SetDlgItemTextA
SendDlgItemMessageA
UpdateWindow
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
CopyRect
PtInRect
GetWindow
GetMenuState
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
GetMenuItemID
LoadIconA
ShowWindow
CreateWindowExA
EndDialog
GetSubMenu
DestroyMenu
GetCursorPos
LoadMenuA
PostQuitMessage
EndPaint
BeginPaint
DestroyWindow
MessageBoxA
DialogBoxParamA
GetDesktopWindow
DefWindowProcA
RegisterClassExA
LoadCursorA
GetMessageA
TranslateMessage
TranslateAcceleratorA
LoadAcceleratorsA
LoadStringA
SendMessageA
GetMenuItemCount
GetClassNameA
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
GetDeviceCaps
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
CreateBitmap
ExtTextOutA
SetBkColor
SetTextColor
GetClipBox
RectVisible
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetUserNameA
RegCloseKey
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyA
RegQueryValueExA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
ord17
UrlUnescapeA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
socket
inet_addr
closesocket
shutdown
setsockopt
connect
gethostbyname
htons
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetGetConnectedState
InternetCrackUrlA
InternetCanonicalizeUrlA
VariantClear
VariantChangeType
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE