Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
39ba900398fe4802c62c8c6a11f50021_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39ba900398fe4802c62c8c6a11f50021_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
39ba900398fe4802c62c8c6a11f50021_JaffaCakes118
Size
1.6MB
MD5
39ba900398fe4802c62c8c6a11f50021
SHA1
921f9b648ffe646a761c5aece4dc5d713176d5d8
SHA256
5c7fcef7bdabb81e5e5088255c63ebb204c2ecf4f49e2364ed78878302a1f3c0
SHA512
a54facf70498d975ade7764571ae1766688d87c82a8da7581bd44faf8cc07dc6b3a5205ca9467e8a8c7ed788401cf60e3c196371512db8e246e387436c91c4b3
SSDEEP
49152:vfd0GFi/pAEE72Ahk5Cj8u9QFWGqQYkhqf4i54:Hd0GFi/pAElAWzuQWvwD
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\Code\1_PCDownloader\PackageTools\product\win32\dbginfo\kpacket.pdb
GetCurrentProcessId
SizeofResource
LockResource
LoadResource
GetTempPathW
CreateFileW
FindResourceExW
GetCurrentProcess
GetFileSize
GetModuleHandleW
TerminateProcess
ExpandEnvironmentStringsW
FindFirstFileW
GetWindowsDirectoryW
lstrcmpW
SetFileAttributesW
GetCurrentDirectoryW
DeleteFileW
MoveFileExW
GetTickCount
GetFileAttributesW
CreateDirectoryW
FindNextFileW
GetLastError
FindClose
SetFilePointer
RemoveDirectoryW
ReadFile
MultiByteToWideChar
GetCommandLineW
WideCharToMultiByte
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
VirtualAlloc
DeleteCriticalSection
SetEvent
InitializeCriticalSection
ReleaseSemaphore
ResetEvent
CreateSemaphoreW
CreateEventW
GetStdHandle
WriteFile
CopyFileW
SetFileTime
MoveFileW
GetTempFileNameW
GetSystemInfo
SystemTimeToFileTime
LocalFileTimeToFileTime
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
CreateFileA
FindResourceW
GetProcAddress
LoadLibraryW
CloseHandle
CreateProcessW
GetSystemDirectoryW
WaitForSingleObject
GetModuleFileNameW
VirtualFree
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
LoadLibraryA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
HeapCreate
GetStringTypeW
RaiseException
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
InterlockedIncrement
InterlockedDecrement
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetCurrentThreadId
CreateThread
GetStartupInfoW
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
ExitProcess
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
UnregisterClassA
CharLowerW
CharUpperW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
CoUninitialize
CoInitialize
SysFreeString
SysAllocString
VariantClear
VariantCopy
PathAddBackslashW
PathRemoveFileSpecW
PathIsDirectoryW
PathAppendW
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ