Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3fc2db57b4d6e947b038126161602ede_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3fc2db57b4d6e947b038126161602ede_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
3fc2db57b4d6e947b038126161602ede_JaffaCakes118
Size
333KB
MD5
3fc2db57b4d6e947b038126161602ede
SHA1
000801626359f53ad270c8a547bcadfed08e0b7c
SHA256
858ae2c450f45fcdc0984b5ec6c9ba70dfdf37a3f86fde21abea0037d4297d28
SHA512
c3f99e05d946bb814771565236da51eb4a3b7de6dd6504e9daf49d35bdf6c67e9ea43bb0f1e8da1721d8b31c34ca4f16be5e9895bb97a85b0a3b694c53c6c8fd
SSDEEP
6144:H7aCDuRPQ9+OjaXH7pfaCOSc6Qxq1Pkhi0g6wY4cky+7hFNPjKqL:H5yuD6M+Ko6wY4c+7tPv
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\build\source\upgradelauncher\rel32\realupgrade.pdb
OleUninitialize
OleInitialize
SetWindowLongA
UnregisterClassA
DestroyWindow
GetSystemMetrics
CharNextA
ReleaseDC
GetDC
SendMessageA
RegisterWindowMessageA
FindWindowA
GetWindowThreadProcessId
GetClassInfoExA
RegisterClassExA
CreateWindowExA
GetWindowLongA
DefWindowProcA
WaitForSingleObject
CreateMutexA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
WideCharToMultiByte
EnterCriticalSection
CloseHandle
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
LeaveCriticalSection
ReleaseMutex
InterlockedIncrement
InterlockedDecrement
SetEnvironmentVariableA
GetModuleFileNameA
GlobalMemoryStatus
OpenProcess
VirtualQuery
GetThreadContext
WriteFile
CreateThread
TerminateThread
IsBadReadPtr
VirtualProtect
IsBadWritePtr
GetCurrentDirectoryA
SetCurrentDirectoryA
SetErrorMode
lstrlenA
LocalAlloc
GetVersion
GetSystemInfo
MoveFileA
CreateDirectoryA
GetFileAttributesA
CreateFileA
DeleteFileA
GetVersionExA
LoadLibraryA
FreeLibrary
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
MultiByteToWideChar
GetEnvironmentVariableA
GetCommandLineW
LocalFree
GetModuleHandleA
GetProcAddress
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
RaiseException
SetFilePointer
SHGetFolderPathA
SHGetFolderPathW
CommandLineToArgvW
strchr
printf
_putenv
_crt_debugger_hook
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
malloc
memcpy
wcsnlen
memset
_recalloc
calloc
free
memmove_s
memcpy_s
strncpy
strrchr
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
asctime
vsprintf
_time32
_gmtime32
strnlen
atoi
wcsstr
realloc
sprintf
_vsnprintf
memmove
strstr
strtol
??_U@YAPAXI@Z
??_V@YAXPAX@Z
getenv
_stricmp
LookupPrivilegeValueA
AdjustTokenPrivileges
CreateWellKnownSid
GetNamedSecurityInfoW
SetEntriesInAclA
AllocateAndInitializeSid
OpenProcessToken
SetNamedSecurityInfoW
FreeSid
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetFileSecurityW
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyA
RegSetValueA
RegQueryValueA
RegDeleteValueA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
PathAddBackslashA
PathAppendA
PathStripToRootW
PathFindNextComponentW
GetFileVersionInfoA
VerQueryValueA
GetDeviceCaps
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ