Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
086fcb8f0fb2b8b84994f5c9896c079b_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
086fcb8f0fb2b8b84994f5c9896c079b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
086fcb8f0fb2b8b84994f5c9896c079b_JaffaCakes118
Size
876KB
MD5
086fcb8f0fb2b8b84994f5c9896c079b
SHA1
3fbae1f793d542207a98314de60544ec6951d16a
SHA256
489a4d5137bb0b339f54777f430c5019786073d93fd6f42b6c530b573fd1dd8a
SHA512
eca13d6735d3bc39a773f496aed07d37c20d16088072935bba8f9b5b6fbb014f50ea57cc8bb14816677b2d9af942849449fec6cf18e40d532b86f0663e6bec61
SSDEEP
24576:VFfmh5DzGDX1TuuGmdjZmvqirzqif2p2r:jmh5fGjqmdjZtiqi1
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PathIsUNCA
UrlIsOpaqueA
SHRegOpenUSKeyA
SHRegWriteUSValueA
HashData
PathMakePrettyA
SHRegEnumUSKeyA
PathFindOnPathA
SHCreateStreamWrapper
StrRChrIA
StrSpnA
SHAutoComplete
SHRegCreateUSKeyA
SHIsLowMemoryMachine
AssocQueryStringA
PathCommonPrefixA
SHDeleteValueA
PathFileExistsA
PathQuoteSpacesA
PathGetDriveNumberA
ColorHLSToRGB
StrChrIA
PathAppendA
StrFormatByteSize64A
PathRemoveBlanksA
PathStripToRootA
PathIsFileSpecA
UrlCombineA
StrIsIntlEqualA
DisconnectNamedPipe
GetPrivateProfileIntA
SetCommTimeouts
ReleaseSemaphore
GetFileAttributesExA
WaitForSingleObject
CancelIo
UnlockFileEx
GetProcessShutdownParameters
CreateDirectoryExA
Process32Next
SetConsoleCursorPosition
HeapCompact
FatalExit
PurgeComm
GetTempPathA
EnumCalendarInfoA
GlobalUnlock
EnumResourceLanguagesA
CopyFileA
GlobalGetAtomNameA
GetNamedPipeHandleStateA
QueryPerformanceCounter
ReadFileEx
AddAtomA
GetSystemTimeAdjustment
GetOverlappedResult
GetCPInfoExA
GetStdHandle
SetFileApisToOEM
FindFirstFileA
IsProcessorFeaturePresent
lstrcpyn
TerminateThread
DebugActiveProcess
SetTimeZoneInformation
GetFileTime
WriteConsoleOutputAttribute
_hread
ContinueDebugEvent
GetCommState
SetProcessAffinityMask
IsValidCodePage
IsBadHugeReadPtr
MoveFileA
WriteProfileStringA
WritePrivateProfileStringA
GetConsoleOutputCP
OpenEventA
GetProcessAffinityMask
BackupSeek
SetCommBreak
SetDefaultCommConfigA
SetConsoleOutputCP
EnumResourceTypesA
GetCommModemStatus
LocalFree
OpenProcess
InterlockedExchange
CreateNamedPipeA
GetModuleFileNameA
OpenEventLogA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ