Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
85b09cd2ad5e553e8820d95fee12c15b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
85b09cd2ad5e553e8820d95fee12c15b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
85b09cd2ad5e553e8820d95fee12c15b_JaffaCakes118
Size
7.8MB
MD5
85b09cd2ad5e553e8820d95fee12c15b
SHA1
9b3ca4a31e2b664cd0237dec7f304df00f430ef4
SHA256
7455b45ec037bf955c07f1bf26fe1dfd68046a509c803bdaa243a685109b8964
SHA512
2e45904ac6f6d2004491a3503053d0acb41598021ef143cedb9095c2a19f259d444cce45632e65a145623cfc6cb4c12edb6d37e389f80490b286ad7ad3ea4a55
SSDEEP
98304:WbpczAhdmsScZ4+fo8mr0/WD4qh0a3rH9S7o7jCeic+grSGtnfn7OFozqyCEgoar:Uck1FmwM4Q3rdDJb2GtYO5K1THprj6kN
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageKeyEncipherment
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetVersion
lstrlenA
CreateProcessA
lstrcmpiA
lstrcatA
lstrcpyA
WaitForSingleObject
WinExec
OpenFile
_lclose
GetFileAttributesA
_lwrite
GetTimeZoneInformation
_lread
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetFileTime
GetFullPathNameA
CreateDirectoryA
GetLastError
SetVolumeLabelA
GetFileSize
GetVolumeInformationA
SetFilePointer
SetStdHandle
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
LoadLibraryA
FlushFileBuffers
GetCurrentProcess
TerminateProcess
GetOEMCP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
RtlUnwind
DeleteCriticalSection
InitializeCriticalSection
HeapReAlloc
HeapCreate
HeapDestroy
GetEnvironmentVariableA
ExitProcess
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentDirectoryA
InterlockedIncrement
InterlockedDecrement
GetLocalTime
GetSystemTime
HeapFree
HeapAlloc
GetProcAddress
FreeLibrary
CompareFileTime
SetFileAttributesA
CopyFileA
GetTempPathA
DeleteFileA
SetCurrentDirectoryA
RemoveDirectoryA
ReadFile
_llseek
GetVersionExA
GetACP
GetDriveTypeA
FindFirstFileA
FindNextFileA
FindClose
VirtualAlloc
VirtualFree
Sleep
GetModuleFileNameA
CreateFileA
CloseHandle
GetWindowsDirectoryA
WriteFile
GetSystemDirectoryA
SetActiveWindow
DestroyWindow
EnableWindow
SetWindowPos
EnumWindows
LoadBitmapA
LoadCursorA
OemToCharA
ShowWindow
GetMessageA
IsDialogMessageA
PostQuitMessage
GetDlgCtrlID
EnableMenuItem
KillTimer
SetTimer
GetWindowTextA
PostMessageA
SetFocus
CreateWindowExA
SetCursor
GetParent
AdjustWindowRectEx
DrawFocusRect
DdeInitializeA
DdeCreateStringHandleA
DdeConnect
wsprintfA
DdeCreateDataHandle
DdeClientTransaction
DdeGetLastError
DdeFreeStringHandle
DdeDisconnect
DdeUninitialize
UnregisterClassA
GetClassInfoA
RegisterClassA
MessageBeep
GetWindowLongA
SetWindowLongA
DefWindowProcA
SetWindowWord
GetClientRect
InvalidateRect
UpdateWindow
BeginPaint
FillRect
EndPaint
CallWindowProcA
GetDC
ScreenToClient
GetSysColor
FrameRect
ReleaseDC
MoveWindow
GetWindowWord
SetWindowTextA
SendMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
DestroyIcon
DestroyCursor
GetDesktopWindow
GetWindowRect
LoadIconA
GetDlgItem
SelectObject
CreateCompatibleDC
SetTextColor
SetBkColor
BitBlt
GetStockObject
SetBkMode
TextOutA
CreateSolidBrush
GetTextExtentPoint32A
DeleteObject
MoveToEx
LineTo
CreatePen
GetTextMetricsA
CreateFontIndirectA
DeleteDC
EnumFontFamiliesA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueA
RegCreateKeyA
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
FindExecutableA
CoTaskMemFree
WNetGetConnectionA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ