Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
397d456ee25a3927d630094ca7300133_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
397d456ee25a3927d630094ca7300133_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
397d456ee25a3927d630094ca7300133_JaffaCakes118
Size
16.9MB
MD5
397d456ee25a3927d630094ca7300133
SHA1
4a8267331e4ff5909d34bb11bc96cb3f70aaea85
SHA256
c30bc7f02536eb3cfa0935eda48c4fd9d795f538e255afa7b4d4ad014cf9a9a2
SHA512
65e8e210e3d4c0b9a5a1691b1bbb5391280bf7638ee2c16d02b15a416d6a33567a64721c3245c881ce230f3301a65d51eb0083d8c79eaf16e398fefe6373261d
SSDEEP
393216:67Fq7+fp5LKnc2LcHnBKLS9OHgpyZSMCqRpA2FK:65q7ALKvcHY+izZLMcK
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetMalloc
RegisterClassW
DefWindowProcW
GetWindowWord
SetWindowWord
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorW
ShowWindow
GetLastActivePopup
PostMessageW
EnableWindow
SendMessageW
GetTopWindow
SetWindowLongW
GetWindowLongW
SetForegroundWindow
DialogBoxParamW
SetDlgItemTextW
EndDialog
GetWindowRect
GetSystemMetrics
SetWindowPos
OemToCharA
SetTimer
GetMessageW
PostQuitMessage
KillTimer
LoadIconW
PeekMessageW
TranslateMessage
DispatchMessageW
SetCursor
GetParent
SendDlgItemMessageW
GetDlgItem
InvalidateRect
UpdateWindow
MessageBoxW
SetWindowTextW
GetDlgItemTextW
SetActiveWindow
LoadStringW
LCMapStringW
LCMapStringA
HeapReAlloc
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetEndOfFile
GetConsoleMode
GetConsoleCP
FindClose
FindFirstFileW
SetCurrentDirectoryW
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
GetVolumeInformationW
CreateDirectoryW
DeleteFileW
LoadLibraryA
RemoveDirectoryW
CloseHandle
CreateFileW
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalAlloc
GetModuleFileNameW
GlobalMemoryStatus
GetVersion
GetVersionExW
WriteFile
GetSystemTime
CreateProcessW
LocalFree
FormatMessageW
GetLastError
ExitProcess
MoveFileExW
FindNextFileW
GetTickCount
WaitForSingleObject
SetErrorMode
CreateFileA
ReadFile
SetFilePointer
InitializeCriticalSection
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFileAttributesW
FlushFileBuffers
SetFileTime
Sleep
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
VirtualAlloc
VirtualFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFullPathNameW
GetLocalTime
GetProcAddress
GetWindowsDirectoryW
GetEnvironmentVariableW
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
GetDriveTypeW
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
GetFileType
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
SetTextColor
SetTextAlign
GetBkColor
GetTextExtentPoint32W
ExtTextOutW
CreateDCW
GetDeviceCaps
CreateFontIndirectW
DeleteDC
SelectObject
DeleteObject
SetBkColor
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ