Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ed0b9164779f297bcc51fc404c6a717e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed0b9164779f297bcc51fc404c6a717e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
ed0b9164779f297bcc51fc404c6a717e_JaffaCakes118
Size
138KB
MD5
ed0b9164779f297bcc51fc404c6a717e
SHA1
418e21e84cc74ebc6debfbd017d8eda0043d143b
SHA256
1500cdfa25505663ad6c16c5191fc314cb0b08f85527bbfc751c02f906d8d99c
SHA512
1cc188eac7b8e8881ec1181972acb6ea30307777bc36baa40df6b15b7aed29a19faf368ed51d48cf6c596606785d440e1c1a611af26ad2da14fff7a42bd8ff91
SSDEEP
1536:kFDw/WsAdjtP2mjN/LLDV/1oB/bq2nHI8+icD/ivcRsWjcdKR/JO1I4nHWPl5:1WseFdLDy22b+DKnPI4nHO5
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RaiseException
CreateThread
GetCurrentThreadId
GetProcessId
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
WaitForSingleObject
WaitForMultipleObjects
Sleep
LoadResource
SizeofResource
CloseHandle
GetHandleInformation
CreateEventW
CreateWaitableTimerW
SetWaitableTimer
LoadLibraryW
GetCurrentProcessId
GetModuleHandleW
GetCommandLineW
FindResourceW
FindResourceExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetStringTypeW
LCMapStringW
OpenProcess
GetProcAddress
FreeLibrary
LockResource
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
DecodePointer
WideCharToMultiByte
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
GetCPInfo
GetOEMCP
GetACP
CreateFileW
IsValidCodePage
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
MultiByteToWideChar
GetModuleHandleExW
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
EncodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
ExitThread
LoadLibraryExW
RtlUnwind
GetStdHandle
WriteFile
ExitProcess
TranslateMessage
DispatchMessageW
GetMessageW
RegisterWindowMessageW
SendMessageTimeoutW
PostThreadMessageW
CharUpperW
CharNextW
EnumChildWindows
FindWindowExW
GetClassNameW
CharLowerBuffW
GetWindowThreadProcessId
RegQueryValueExW
RegCreateKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteKeyW
RegCloseKey
RegSetValueExW
CoUninitialize
CoInitializeEx
CoRegisterClassObject
CoRevokeClassObject
CoResumeClassObjects
CoAddRefServerProcess
CoReleaseServerProcess
StringFromGUID2
CLSIDFromString
CoCreateGuid
CoCreateInstance
VariantInit
SysStringLen
VariantClear
SysAllocString
VarBstrCmp
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
DispCallFunc
UnRegisterTypeLi
RegisterTypeLi
LoadRegTypeLi
LoadTypeLi
SysFreeString
PathStripPathW
GetProcessImageFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ