Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
36f4908e0886dfbfe64b52a9c4033f6b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36f4908e0886dfbfe64b52a9c4033f6b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
36f4908e0886dfbfe64b52a9c4033f6b_JaffaCakes118
Size
1.3MB
MD5
36f4908e0886dfbfe64b52a9c4033f6b
SHA1
6694a7f3b455c517d9326a62799bb61332142536
SHA256
7b88c8fcd296a5ef6a663c02ef3837f65e97fa2b3669648dca7fa3223270a310
SHA512
e43a2f307c23a3e71f77b659bc6a1146d46dd32666bc828daded6c9e5ddf1c26e613b1ac25907ec485874228d6019d9a082f9fe392dc11c1f69a94d8f1417f95
SSDEEP
24576:pPhCVbYgIPx31OUHGlUn0iqJB3ZsVBfxCdNBLX0LflXDzh8:X1xFOUmlUnkgrCdNBLEJz2
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
d:\cpueblo\Neowiz\SourceSafe_Nirvana2\Utilities\Sase\Sase\Sase\Release\SASE.pdb
FindFirstFileA
lstrcatA
lstrcpyA
lstrlenA
GetModuleFileNameA
Sleep
CreateThread
ExitProcess
GetExitCodeProcess
CreateProcessA
GetModuleHandleA
GetTempFileNameA
GetTempPathA
GetTickCount
SetFileAttributesA
VirtualProtect
GetLocaleInfoA
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
HeapSize
GetCPInfo
GetOEMCP
GetACP
VirtualQuery
InterlockedExchange
RtlUnwind
LoadLibraryA
DeleteFileA
FindNextFileA
FindClose
SetCurrentDirectoryA
RemoveDirectoryA
CreateDirectoryA
WriteFile
CreateFileA
ReadFile
SetFilePointer
CloseHandle
GetLastError
GetFileType
HeapAlloc
HeapFree
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
SetEndOfFile
SetHandleCount
GetStdHandle
SetStdHandle
GetProcAddress
TerminateProcess
GetCurrentProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
GetSystemInfo
DialogBoxParamA
MessageBoxA
BeginPaint
LoadBitmapA
FillRect
DrawTextA
EndPaint
SetWindowTextA
GetSystemMetrics
GetWindowRect
MoveWindow
EndDialog
InvalidateRect
PostMessageA
GetObjectA
CreateFontA
CreateBrushIndirect
CreatePen
CreateCompatibleDC
SelectObject
BitBlt
DeleteObject
DeleteDC
SetBkMode
SetTextColor
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ