Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
20255c18fcf4d788c74e5547df9bcc9a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20255c18fcf4d788c74e5547df9bcc9a_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
20255c18fcf4d788c74e5547df9bcc9a_JaffaCakes118
Size
406KB
MD5
20255c18fcf4d788c74e5547df9bcc9a
SHA1
54c105293d93f947db0eed319846a62e236cb8d1
SHA256
244e6bf9ada31aea20c244518c04606a3595358486e895f6eb0cfdec389f31e1
SHA512
88700b33b2e6699d2bfde1f0baf198155a745e853da82808c174253d62fe4060ac9703321ff7f6af1e5ca755e0ea8e6ea1411ba0ae033bfb8a3430157eea80b8
SSDEEP
6144:ZMsHe0BivO39zYpmH+kAzkA7ZUgbc6AYJ8rEdrEbAgMMV6NX5ZNeVgjYfhTHg:Z1nIO39YAeNLFjAYarEdrEb5P6VxY1
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
t:\word\x86\ship\0\winword.pdb
LoadLibraryExW
LoadLibraryW
GetProcAddress
GetLastError
GetSystemDirectoryW
FreeLibrary
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetModuleHandleW
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
VirtualProtect
IsDebuggerPresent
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
_crt_debugger_hook
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
__set_app_type
DllGetLCID
wdCommandDispatch
wdGetApplicationObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE