Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
eb4faf00edf2ccdab4126200572c7663_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb4faf00edf2ccdab4126200572c7663_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
eb4faf00edf2ccdab4126200572c7663_JaffaCakes118
Size
257KB
MD5
eb4faf00edf2ccdab4126200572c7663
SHA1
c8eaaf5c3cff96033e63f69b0f796fa754d0c855
SHA256
b41ea0064fc0dbda2852c7d5e4b964fbe4ee542d978c0ea3391d7acc35d3b85b
SHA512
66915869b20665c805fb32b51ef4bf5005e1a4f64cf11d42247e8a8012f2b3bf4558f28eac49710a6f4aaad34d14e951d972657f6e0a80d072f6d3d5a8b6ddd2
SSDEEP
6144:7v8fA62Er0pcOlFNMyd1r1gmfretcokiqASYgDe7t1:g465IMy/3freyoZ9gIt1
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OpenWaitableTimerW
GetProcAddress
GetACP
GetWindowsDirectoryW
GetNumberFormatW
GetStartupInfoA
CreateThread
GetDateFormatW
LoadLibraryW
GetFullPathNameA
GetCommandLineW
LoadLibraryA
GetCalendarInfoW
EnableWindow
SetTimer
EnumDesktopsW
EnumClipboardFormats
GetWindowDC
DialogBoxIndirectParamW
TrackPopupMenu
GetSysColorBrush
SetWindowTextA
IsWindow
OffsetRect
MessageBeep
CreateDesktopA
MonitorFromRect
CreateDesktopW
PeekMessageW
IsIconic
GetMenuItemRect
WinHelpA
DeleteMenu
CopyRect
GetClassLongA
CreateWindowExA
DefDlgProcW
GetMessageW
GetActiveWindow
RegisterWindowMessageW
EnumDesktopWindows
DefDlgProcA
GetBoundsRect
ExtCreateRegion
DeleteObject
CloseFigure
FillRgn
SwapBuffers
GetICMProfileA
RestoreDC
RegFlushKey
RegEnumValueW
CoGetClassVersion
CoCreateInstanceEx
OleSaveToStream
CreateErrorInfo
CoInitializeEx
CoDosDateTimeToFileTime
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ