Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
153eeedbda32e264125aad4f2687e900_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
153eeedbda32e264125aad4f2687e900_JaffaCakes118.exe
Resource
win10v2004-20240910-en
Target
153eeedbda32e264125aad4f2687e900_JaffaCakes118
Size
1.4MB
MD5
153eeedbda32e264125aad4f2687e900
SHA1
a272c04d11d8cab5469d51a733be4e026ea48eba
SHA256
33134dd9e72a2d0c609c8c48eb7dd0c6bd6dd77f124aee09a97e8d64f33339cb
SHA512
6e95d6667b368b9c385bc539513396feccc415759599b13bcbc246fdcdcf846f415a8677f7c3b59808cb9505800f63558589d7340da76107ec4e6d77c1c48ee1
SSDEEP
24576:Ztqat8OQfRw7I7mIimYt2BHP9AmKeqaboaEYrs6jjlvkeulAFHsssGEkI:5WO8D77iCBvSGoaR
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\DriverGenius Dev\DriverGenius\trunk\product\win32\dbginfo\UsbPnp.pdb
sqlite3_get_table
sqlite3_free_table
sqlite3_close
sqlite3_open
GetProcessId
Sleep
CreateEventW
LoadLibraryExW
GetSystemTimeAsFileTime
FreeLibrary
GetTempPathW
LoadLibraryW
lstrcpynW
CreateThread
GetCurrentProcessId
FatalAppExitW
SetUnhandledExceptionFilter
lstrcmpiW
WriteFile
SetFilePointer
CreateFileA
GetFileAttributesA
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
SetFilePointerEx
GetFileSizeEx
FindFirstFileA
FindNextFileA
GetFileAttributesExA
GetFileAttributesExW
DeleteFileA
DeleteFileW
CopyFileA
CopyFileW
RemoveDirectoryA
RemoveDirectoryW
MoveFileA
MoveFileW
MoveFileExA
MoveFileExW
CreateDirectoryW
GetLocalTime
GetVersionExW
lstrcmpA
GetStartupInfoW
VirtualAlloc
CreateToolhelp32Snapshot
IsProcessorFeaturePresent
LoadLibraryA
InterlockedCompareExchange
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
FileTimeToSystemTime
FileTimeToLocalFileTime
GetUserDefaultLangID
GetModuleFileNameW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetPrivateProfileSectionW
GetPrivateProfileSectionNamesW
WritePrivateProfileSectionW
MultiByteToWideChar
CloseHandle
VirtualFreeEx
ReadProcessMemory
OutputDebugStringW
WriteProcessMemory
VirtualAllocEx
OpenProcess
LeaveCriticalSection
RaiseException
GetLastError
EnterCriticalSection
Process32FirstW
Process32NextW
GetTickCount
OpenEventW
SetEvent
FindFirstFileW
FindNextFileW
FindClose
CreateFileW
GetFileSize
ReadFile
GlobalAlloc
QueryPerformanceCounter
GlobalLock
GlobalUnlock
InterlockedDecrement
InterlockedIncrement
MulDiv
lstrcmpW
DeleteCriticalSection
InitializeCriticalSection
FreeResource
SetLastError
CreateMutexW
WaitForSingleObject
GetExitCodeProcess
GetCurrentThreadId
lstrlenW
lstrlenA
GetVersion
WideCharToMultiByte
GetModuleHandleW
GetProcAddress
GetCurrentProcess
VirtualFree
FlushInstructionCache
GetWindowLongW
SetWindowLongW
GetWindowThreadProcessId
GetDesktopWindow
GetWindow
GetClassNameW
SendMessageW
RegisterWindowMessageW
DestroyWindow
DispatchMessageW
TranslateMessage
FindWindowW
FindWindowExW
UnregisterClassA
CreateWindowExW
MoveWindow
SetWindowPos
GetDlgItem
SetRect
CopyRect
LoadCursorW
wsprintfW
GetClassInfoExW
GetMessageW
IsWindow
PeekMessageW
ShowWindow
DefWindowProcW
RegisterClassExW
PostMessageW
GetSysColor
PtInRect
GetDC
ReleaseDC
UpdateLayeredWindow
GetCursorPos
DialogBoxParamW
CharNextW
GetParent
GetWindowRect
GetClientRect
InvalidateRect
SystemParametersInfoW
MapWindowPoints
SetWindowRgn
SetParent
EndDialog
MessageBoxW
GetSystemMetrics
GetForegroundWindow
WindowFromPoint
LoadBitmapW
SetCursorPos
mouse_event
ExitWindowsEx
GetAsyncKeyState
PostThreadMessageW
SetTimer
GetKeyState
MonitorFromWindow
GetMonitorInfoW
GetActiveWindow
IsWindowEnabled
EnableWindow
SetActiveWindow
OffsetRect
DrawIconEx
LoadIconW
LoadImageW
DrawFrameControl
GetDlgCtrlID
EqualRect
DestroyIcon
KillTimer
IsWindowVisible
DrawTextW
SetCursor
InflateRect
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
CreateAcceleratorTableW
GetFocus
SetFocus
DestroyAcceleratorTable
BeginPaint
EndPaint
CallWindowProcW
FillRect
ReleaseCapture
IsChild
SetCapture
RedrawWindow
InvalidateRgn
ScreenToClient
ClientToScreen
DeleteObject
GetObjectW
GetStockObject
CreateCompatibleDC
SelectObject
CreateCompatibleBitmap
DeleteDC
BitBlt
GetDeviceCaps
CreateSolidBrush
SetBkColor
SetBkMode
SetTextColor
ExtTextOutW
RectInRegion
SelectClipRgn
RoundRect
CreatePen
CreateRectRgn
CreateRectRgnIndirect
GetClipRgn
MoveToEx
LineTo
SaveDC
RestoreDC
TextOutW
GetTextExtentPoint32W
CreateDIBSection
StretchBlt
CreateBitmap
CombineRgn
Rectangle
CreateRoundRectRgn
CreateFontIndirectW
RegQueryInfoKeyW
RegOpenKeyExW
RegSetValueExA
RegEnumValueW
RegEnumValueA
RegEnumKeyW
RegEnumKeyA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegCreateKeyExA
RegCreateKeyW
RegCreateKeyA
RegOpenKeyExA
RegOpenKeyW
RegOpenKeyA
RegEnumKeyExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegQueryValueExW
RegCloseKey
ShellExecuteExW
Shell_NotifyIconW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderPathW
CoTaskMemFree
CoTaskMemRealloc
CoInitialize
CoUninitialize
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
VarUI4FromStr
LoadRegTypeLi
OleCreateFontIndirect
DispCallFunc
VarBstrCmp
LoadTypeLi
SysFreeString
SysStringLen
SysAllocStringLen
SysAllocString
SysStringByteLen
VariantInit
VariantClear
PathRemoveFileSpecW
PathFileExistsW
StrToIntA
StrToIntW
PathIsDirectoryA
PathIsDirectoryW
PathFileExistsA
SHGetValueA
SHGetValueW
SHSetValueA
SHSetValueW
SHDeleteValueA
SHDeleteValueW
PathAppendW
_TrackMouseEvent
GdipDeleteFont
GdipCreateSolidFill
GdipCreateFromHDC
GdipDrawString
GdipCreateFont
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatTrimming
GdipCloneBrush
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipDeleteGraphics
GdipAlloc
GdiplusShutdown
GdiplusStartup
GdipDrawImageRectI
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipCloneImage
GdipDisposeImage
GdipGetImageWidth
GdipLoadImageFromFile
GdipFree
GdipLoadImageFromFileICM
GdipDrawImageRectRectI
GdipGetImageHeight
GdipDeleteBrush
ord257
ord393
ord397
ord260
ord285
ord326
ord395
ord39
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
_mbscmp
strlen
_localtime64
??0exception@std@@QAE@XZ
memcmp
_mbschr
atoi
_mbsicmp
_mbsstr
_wtoi
wcscat
_wcslwr
swscanf
atol
swscanf_s
fopen_s
ferror
fputc
fprintf
sscanf_s
atof
_vsnprintf_s
fread
ftell
fseek
fclose
isspace
isalpha
isalnum
??0exception@std@@QAE@ABV01@@Z
strchr
memmove_s
?terminate@@YAXXZ
_except_handler4_common
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__wgetmainargs
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
_stricmp
__p__commode
__p__fmode
__set_app_type
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_invoke_watson
_controlfp_s
_invalid_parameter_noinfo
_recalloc
_vscprintf
vsprintf
malloc
_time64
strcmp
strncmp
_waccess
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
??2@YAPAXI@Z
_purecall
wcsrchr
iswspace
calloc
free
wcschr
wcsstr
wcscmp
wcstod
wcstoul
wcstol
_wcsrev
_wcsicmp
wcscpy
_swprintf
wcsncpy
_wcsdup
??_U@YAPAXI@Z
memset
??_V@YAXPAX@Z
memmove
memcpy
wcslen
_mktime64
_vscwprintf
__CxxFrameHandler3
_CxxThrowException
_vswprintf
??3@YAXPAX@Z
tolower
_cexit
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?clear@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
EnumProcesses
GetProcessImageFileNameW
MiniDumpWriteDump
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE