Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
30fa991a5f7369b5ec157f1bd42cc014_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
30fa991a5f7369b5ec157f1bd42cc014_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
30fa991a5f7369b5ec157f1bd42cc014_JaffaCakes118
Size
164KB
MD5
30fa991a5f7369b5ec157f1bd42cc014
SHA1
898379559f05b779800fafa9db23513f86d6b980
SHA256
2577253a4a92f90858feaddc7de81ac8175757e7761dc5346a7b26c7d873c6d0
SHA512
205bfec9bb60699839a2579a1c8b31a64205dcc43e92cd91e9d247157a0e6ef626bbf35c3e747e9b1e8b40ba99236a83fcfc5340ff35890febe648ad43401bbd
SSDEEP
3072:yfvx0LMBe5boqYXTLPJr6IKVSihbNppbw9xtyxCeDjQ:yfvWQo5boqYXTLNRKRjJx/D8
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\sogoupy_R_4_2\Bin\SogouInput\SysDicMaker.pdb
ImmDisableIME
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
CreateEventW
SetFilePointer
CreateFileW
CreateProcessW
ExitThread
WaitForMultipleObjects
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
CreateMutexW
OpenMutexW
ReleaseMutex
WaitForSingleObject
MultiByteToWideChar
WideCharToMultiByte
GetSystemDirectoryW
FindClose
FindFirstFileW
CreateDirectoryW
FileTimeToSystemTime
LocalAlloc
FlushFileBuffers
Sleep
ReadFile
InterlockedDecrement
GetProcAddress
GetModuleHandleA
ExitProcess
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
HeapReAlloc
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
GetDriveTypeW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
FormatMessageW
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetConsoleCP
GetConsoleMode
RtlUnwind
GetStdHandle
GetModuleFileNameA
LoadLibraryA
InitializeCriticalSection
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
HeapSize
VirtualAlloc
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetFullPathNameW
GetCurrentDirectoryA
SetStdHandle
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
CreateFileA
SetEndOfFile
GetDriveTypeA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalFree
LocalFree
WriteFile
DuplicateHandle
GetCurrentThreadId
SetLastError
GetLastError
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
GetCurrentProcess
CloseHandle
GetTempPathW
GetCommandLineW
DeleteCriticalSection
EnterCriticalSection
GetModuleFileNameW
GetModuleHandleW
LeaveCriticalSection
TlsGetValue
GetSystemMetrics
MessageBoxW
BuildExplicitAccessWithNameW
GetSidLengthRequired
SetEntriesInAclW
InitializeAcl
SetSecurityInfo
GetSecurityDescriptorSacl
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
LookupAccountSidW
GetTokenInformation
AddAccessAllowedAceEx
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
GetNamedSecurityInfoW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SHGetSpecialFolderPathW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ