Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
223bf2b86d2e2370e104a6b63c6cc417_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
223bf2b86d2e2370e104a6b63c6cc417_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
223bf2b86d2e2370e104a6b63c6cc417_JaffaCakes118
Size
3.5MB
MD5
223bf2b86d2e2370e104a6b63c6cc417
SHA1
d29b9e707c16c6af6d814bd200d784af657cb010
SHA256
c82b9838f74a07828043fc2b46836f10e015dd4db0fbff08594cc0485034dc9e
SHA512
e89bd86dd51d19b59df10ea209f50778ba396e86dcb6b0f034fc053d964b1e2ff3e40b582c973599cd3bc30536e7586bd0b1069e2276c9659167caefa3bd9391
SSDEEP
98304:qZJD40xEoH7n+v7+7L2nn+eVfPRn/S9iRSs:qZJ0ZoqvECnn+ARngigs
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetMalloc
RegisterClassW
DefWindowProcW
GetWindowWord
SetWindowWord
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorW
ShowWindow
GetLastActivePopup
PostMessageW
EnableWindow
SendMessageW
GetTopWindow
SetWindowLongW
GetWindowLongW
SetForegroundWindow
DialogBoxParamW
SetDlgItemTextW
EndDialog
GetWindowRect
GetSystemMetrics
SetWindowPos
OemToCharA
SetTimer
GetMessageW
PostQuitMessage
KillTimer
LoadIconW
PeekMessageW
TranslateMessage
DispatchMessageW
SetCursor
GetParent
SendDlgItemMessageW
GetDlgItem
InvalidateRect
UpdateWindow
MessageBoxW
SetWindowTextW
GetDlgItemTextW
SetActiveWindow
LoadStringW
LCMapStringW
LCMapStringA
HeapReAlloc
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetEndOfFile
GetConsoleMode
GetConsoleCP
FindClose
FindFirstFileW
SetCurrentDirectoryW
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
GetVolumeInformationW
CreateDirectoryW
DeleteFileW
LoadLibraryA
RemoveDirectoryW
CloseHandle
CreateFileW
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalAlloc
GetModuleFileNameW
GlobalMemoryStatus
GetVersion
GetVersionExW
WriteFile
GetSystemTime
CreateProcessW
LocalFree
FormatMessageW
GetLastError
ExitProcess
MoveFileExW
FindNextFileW
GetTickCount
WaitForSingleObject
SetErrorMode
CreateFileA
ReadFile
SetFilePointer
InitializeCriticalSection
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFileAttributesW
FlushFileBuffers
SetFileTime
Sleep
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
VirtualAlloc
VirtualFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFullPathNameW
GetLocalTime
GetProcAddress
GetWindowsDirectoryW
GetEnvironmentVariableW
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
GetDriveTypeW
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
GetFileType
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
SetTextColor
SetTextAlign
GetBkColor
GetTextExtentPoint32W
ExtTextOutW
CreateDCW
GetDeviceCaps
CreateFontIndirectW
DeleteDC
SelectObject
DeleteObject
SetBkColor
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ