Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2cd8f6cfad216974ef9c317877bf1deb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2cd8f6cfad216974ef9c317877bf1deb_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
2cd8f6cfad216974ef9c317877bf1deb_JaffaCakes118
Size
20.0MB
MD5
2cd8f6cfad216974ef9c317877bf1deb
SHA1
7a2a51007c45ca4031bfcaaa23551cdc44198eb5
SHA256
796bff83e04e17a9ead726b60e4278393ea12417918cf66afd449deec5a5adfc
SHA512
c6385826e1ef37d312e4e876362e459c6b5bef6774ea7a5bac0943b245bbfca6ad7839d3eb5631e89d2a7b33773c92bf282a0cde2fcbcfa6fcf4847f6c01e4b2
SSDEEP
393216:ZBBiTJWN99Zc5YvTZPFMxTJyCmssifMJNxM+Xrh8o5xJwIuBtG:ZBcu+5YvlMTJUeKflh8s0tG
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetMalloc
RegisterClassW
DefWindowProcW
GetWindowWord
SetWindowWord
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorW
ShowWindow
GetLastActivePopup
PostMessageW
EnableWindow
SendMessageW
GetTopWindow
SetWindowLongW
GetWindowLongW
SetForegroundWindow
DialogBoxParamW
SetDlgItemTextW
EndDialog
GetWindowRect
GetSystemMetrics
SetWindowPos
OemToCharA
SetTimer
GetMessageW
PostQuitMessage
KillTimer
LoadIconW
PeekMessageW
TranslateMessage
DispatchMessageW
SetCursor
GetParent
SendDlgItemMessageW
GetDlgItem
InvalidateRect
UpdateWindow
MessageBoxW
SetWindowTextW
GetDlgItemTextW
SetActiveWindow
LoadStringW
LCMapStringW
LCMapStringA
HeapReAlloc
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetEndOfFile
GetConsoleMode
GetConsoleCP
FindClose
FindFirstFileW
SetCurrentDirectoryW
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
GetVolumeInformationW
CreateDirectoryW
DeleteFileW
LoadLibraryA
RemoveDirectoryW
CloseHandle
CreateFileW
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalAlloc
GetModuleFileNameW
GlobalMemoryStatus
GetVersion
GetVersionExW
WriteFile
GetSystemTime
CreateProcessW
LocalFree
FormatMessageW
GetLastError
ExitProcess
MoveFileExW
FindNextFileW
GetTickCount
WaitForSingleObject
SetErrorMode
CreateFileA
ReadFile
SetFilePointer
InitializeCriticalSection
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFileAttributesW
FlushFileBuffers
SetFileTime
Sleep
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
VirtualAlloc
VirtualFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFullPathNameW
GetLocalTime
GetProcAddress
GetWindowsDirectoryW
GetEnvironmentVariableW
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
GetDriveTypeW
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
GetFileType
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
SetTextColor
SetTextAlign
GetBkColor
GetTextExtentPoint32W
ExtTextOutW
CreateDCW
GetDeviceCaps
CreateFontIndirectW
DeleteDC
SelectObject
DeleteObject
SetBkColor
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ