Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
ec96028180eedbb230e8f29fd90a6167_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec96028180eedbb230e8f29fd90a6167_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
ec96028180eedbb230e8f29fd90a6167_JaffaCakes118
Size
12.6MB
MD5
ec96028180eedbb230e8f29fd90a6167
SHA1
80746cda3bd1e8ff5c7fd0ccab17ccbbca0baee0
SHA256
e4e0fc0334e479be8af8f0e3a9bc909a83b384ec9513c657ee8f17899f8099bb
SHA512
59dcc192d1b48bb9502e9bdcbe96b6f5cac7d955961c3d4f1ae2e5fc2c7dddf3ff482e781bcf9020722a5ee99246a29d2eb29f7660cb81c5a902b681b37c2605
SSDEEP
196608:/fWFrLwacjG4wXnkAEgBviCEQe48BFOZvSUhWYFe80UEui:XcrcJS4wXn7EcRe4LSUh7FSui
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ShellExecuteExA
DefWindowProcA
GetWindowWord
SetWindowWord
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorA
GetLastActivePopup
ShowWindow
PostMessageA
SendMessageA
EnableWindow
GetTopWindow
SetWindowLongA
GetWindowLongA
SetWindowTextA
SetForegroundWindow
SetActiveWindow
DialogBoxIndirectParamA
GetDlgItemTextA
RegisterClassA
GetWindowRect
GetSystemMetrics
SetWindowPos
LoadIconA
SetTimer
GetMessageA
KillTimer
PostQuitMessage
SendDlgItemMessageA
UpdateWindow
SetDlgItemTextA
GetDlgItem
InvalidateRect
CharUpperBuffA
OemToCharBuffA
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
MessageBoxA
SetCursor
CharNextA
EndDialog
SetCurrentDirectoryA
SetStdHandle
GetLocaleInfoA
GetSystemInfo
VirtualProtect
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
HeapAlloc
HeapReAlloc
VirtualQuery
InterlockedExchange
LoadLibraryA
GetStringTypeW
GetStringTypeA
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
FindClose
FindFirstFileA
CreateDirectoryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
_lopen
GetDriveTypeA
GetEnvironmentVariableA
DeleteFileA
SetFileAttributesA
RemoveDirectoryA
GlobalFree
GlobalUnlock
GlobalHandle
_lclose
_llseek
_lread
GlobalLock
GlobalAlloc
LocalFree
GlobalMemoryStatus
GetVersion
GetModuleFileNameA
WriteFile
GetSystemTime
lstrlenA
CreateProcessA
ExitProcess
CloseHandle
CreateFileA
FlushFileBuffers
_lcreat
GetVolumeInformationA
GetWindowsDirectoryA
SetEndOfFile
SetFilePointer
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
MoveFileExA
FindNextFileA
GetTickCount
OpenFile
FormatMessageA
GetLastError
WinExec
_lwrite
WaitForSingleObject
SetErrorMode
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetStdHandle
SelectObject
GetBkColor
SetBkColor
SetTextColor
SetTextAlign
DeleteObject
GetTextExtentPoint32A
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ