Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
39f9570860608f4683672d541e32b725_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
39f9570860608f4683672d541e32b725_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
39f9570860608f4683672d541e32b725_JaffaCakes118
Size
138KB
MD5
39f9570860608f4683672d541e32b725
SHA1
f1942664cc844ba6e5415c744d718bc16ae9af73
SHA256
23672717df350320616f1fbc7add3b708a1bb7423f9475b6f7e4f57568fa718e
SHA512
60a64927bb1677c5305dfe4b97762af2e1a1836a615c3b85fe3bdf7edf7c4970bc29c8c39b4fc5d6c846f910552caea72b55b2acd9c494574932393b0d348d20
SSDEEP
1536:7FaUjctkZLtH28Qrvzc1V/V4J3i6+PX+qcjkcsWjcdVG7JpI4nTJVwRtvi2:dctOUPc1qD6X+LkDgvI4nTJQvN
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RaiseException
CreateThread
GetCurrentThreadId
GetProcessId
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
WaitForSingleObject
WaitForMultipleObjects
Sleep
LoadResource
SizeofResource
CloseHandle
GetHandleInformation
CreateEventW
CreateWaitableTimerW
SetWaitableTimer
LoadLibraryW
GetCurrentProcessId
GetModuleHandleW
GetCommandLineW
FindResourceW
FindResourceExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetStringTypeW
LCMapStringW
OpenProcess
GetProcAddress
FreeLibrary
LockResource
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
DecodePointer
WideCharToMultiByte
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
GetCPInfo
GetOEMCP
GetACP
CreateFileW
IsValidCodePage
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
MultiByteToWideChar
GetModuleHandleExW
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
EncodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
ExitThread
LoadLibraryExW
RtlUnwind
GetStdHandle
WriteFile
ExitProcess
TranslateMessage
DispatchMessageW
GetMessageW
RegisterWindowMessageW
SendMessageTimeoutW
PostThreadMessageW
CharUpperW
CharNextW
EnumChildWindows
FindWindowExW
GetClassNameW
CharLowerBuffW
GetWindowThreadProcessId
RegQueryValueExW
RegCreateKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteKeyW
RegCloseKey
RegSetValueExW
CoUninitialize
CoInitializeEx
CoRegisterClassObject
CoRevokeClassObject
CoResumeClassObjects
CoAddRefServerProcess
CoReleaseServerProcess
StringFromGUID2
CLSIDFromString
CoCreateGuid
CoCreateInstance
VariantInit
SysStringLen
VariantClear
SysAllocString
VarBstrCmp
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
DispCallFunc
UnRegisterTypeLi
RegisterTypeLi
LoadRegTypeLi
LoadTypeLi
SysFreeString
PathStripPathW
GetProcessImageFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ