Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
223c8499c275559464f888ff67f165d1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
223c8499c275559464f888ff67f165d1_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
223c8499c275559464f888ff67f165d1_JaffaCakes118
Size
572KB
MD5
223c8499c275559464f888ff67f165d1
SHA1
2bc5ffcc600a9258036c6eb55b2c7b5d39801c01
SHA256
2111d4773091a24c357b516be87b1ea8d7a6222944aa84f076d759562cb273db
SHA512
0f657bd16bd0726eecfc18df8a39a476237fa89aa5d9baf43e15040c9776f92b2d4bdf10d1c2ddd06392a6e8298ee625ebff59ec0ff1fda1a42d3975dbb6e7ab
SSDEEP
12288:dYAOZnc/tsUoJwZTEI7XHgZQKhJgeCm+S:dYAOZOtwSZT7LHgZpJEy
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
t:\oneaddins\x86\ship\0\iecontentservice.pdb
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
GetUserNameExW
UuidCreate
CompareStringW
QueryPerformanceCounter
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
UnhandledExceptionFilter
RaiseException
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
lstrlenW
GetLastError
GetProcAddress
GetModuleHandleW
lstrcmpiW
OpenFileMappingW
CreateFileMappingW
OpenProcess
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
GlobalFree
Sleep
GetCommandLineW
HeapFree
HeapAlloc
GetProcessHeap
GetModuleHandleA
VirtualAlloc
HeapSetInformation
HeapCreate
HeapDestroy
HeapReAlloc
HeapSize
HeapUnlock
HeapLock
TlsSetValue
SetLastError
GetFileAttributesW
GetVersion
LoadLibraryW
OutputDebugStringA
WideCharToMultiByte
LoadLibraryA
VirtualFree
TlsGetValue
InitializeCriticalSectionAndSpinCount
TlsAlloc
GetSystemDefaultLCID
TlsFree
GetVersionExA
GetModuleHandleExW
RtlCaptureStackBackTrace
WaitForSingleObject
ReleaseMutex
GetSystemTimeAsFileTime
GetTickCount
GetLocalTime
WriteFile
SetFileAttributesW
DeleteFileW
ReadFile
GetCurrentThreadId
CreateFileW
ExpandEnvironmentStringsW
GetProcessTimes
GetCurrentProcess
CreateMutexA
OpenMutexA
CreateSemaphoreA
CreateFileMappingA
GetShortPathNameA
GetModuleFileNameA
GlobalAlloc
IsValidLocale
GetSystemDirectoryW
GetTimeZoneInformation
GetDiskFreeSpaceExW
IsWow64Process
GetSystemInfo
GetUserDefaultLCID
GetVersionExW
TerminateProcess
GetCurrentProcessId
UnmapViewOfFile
MapViewOfFile
LocalFree
LocalAlloc
GetTempPathW
GetShortPathNameW
GetLongPathNameW
CreateDirectoryW
GetFileType
IsDBCSLeadByte
LockResource
FindResourceA
GetStringTypeExW
IsValidCodePage
SetUnhandledExceptionFilter
GetCurrentThread
GlobalMemoryStatus
ReleaseSemaphore
IsProcessorFeaturePresent
IsDebuggerPresent
VirtualProtect
_CxxThrowException
wcsncpy_s
__CxxFrameHandler3
_recalloc
memcpy
wcschr
bsearch
_vsnprintf_s
wcsncat_s
strncpy_s
memmove
wcsrchr
_CIsqrt
vswprintf_s
_vscwprintf
_vsnprintf
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_except_handler4_common
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_crt_debugger_hook
_invoke_watson
_controlfp_s
?_type_info_dtor_internal_method@type_info@@QAEXXZ
memset
malloc
memcpy_s
free
wcsstr
StrRetToBufW
PathStripPathW
UrlIsW
UrlUnescapeW
GdipGetImageEncodersSize
GdipCloneImage
GdipSaveImageToStream
GdipGetImageEncoders
GdipAlloc
GdipFree
GdipGetImageThumbnail
GdiplusShutdown
GdipDisposeImage
GdiplusStartup
GdipCreateBitmapFromHBITMAP
InternetCanonicalizeUrlW
_GetAllocCounters@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE