Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
0b644ebe34259c653f7ca3c340af4da9_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0b644ebe34259c653f7ca3c340af4da9_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
0b644ebe34259c653f7ca3c340af4da9_JaffaCakes118
Size
4.1MB
MD5
0b644ebe34259c653f7ca3c340af4da9
SHA1
7ae28d8c6272fce8f8167a96d0d6c35d1ed95215
SHA256
805374ff33c185bc2b5191a8c1b4c19fff4f774856dd1b9fff0189ff0bc9a989
SHA512
57e43b8e1c7dd913429febe793d41be4e9d324830f68528e2a2153683fa623e5efc62cb1c6f35ea47e2fa5cf7f320b8d1c3d3a480be3008f6529dd814ddb48c4
SSDEEP
98304:iGh9neV5u0bTgerFWZOeBihl759mORBYFs7H:iGqV5JZFXWihM67
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
CreateSolidBrush
DeleteObject
IntersectClipRect
SetBkColor
SetBkMode
SetTextColor
AddVectoredExceptionHandler
CloseHandle
CompareStringA
CompareStringW
CreateDirectoryA
CreateEventA
CreateFileA
CreateProcessA
CreateThread
DeleteCriticalSection
DeleteFileA
DuplicateHandle
EnterCriticalSection
EnumCalendarInfoA
EnumResourceLanguagesA
EnumResourceNamesA
EnumResourceTypesA
ExitProcess
ExitThread
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FindResourceExA
FormatMessageA
FreeLibrary
FreeResource
GetCommandLineA
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentVariableA
GetFileTime
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetThreadLocale
GetThreadPriority
GetTickCount
GetVersionExA
GetWindowsDirectoryA
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LockResource
MultiByteToWideChar
ReadFile
ReadProcessMemory
RemoveDirectoryA
ResetEvent
ResumeThread
SetCurrentDirectoryA
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
SetFileTime
SetLastError
SetThreadPriority
SizeofResource
Sleep
SuspendThread
SystemTimeToFileTime
TerminateThread
TlsAlloc
TlsGetValue
TlsSetValue
TryEnterCriticalSection
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
SafeArrayAccessData
SafeArrayCreate
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayRedim
SafeArrayUnaccessData
SysAllocStringLen
SysFreeString
SysReAllocStringLen
VariantChangeTypeEx
VariantClear
VariantCopy
VariantInit
FindExecutableA
CharLowerA
CharLowerBuffA
CharLowerBuffW
CharNextA
CharPrevA
CharUpperA
CharUpperBuffA
CharUpperBuffW
CreateDialogParamA
DeleteMenu
DestroyWindow
DispatchMessageA
DrawTextA
FillRect
GetActiveWindow
GetAsyncKeyState
GetClientRect
GetDC
GetDesktopWindow
GetDlgItem
GetParent
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowRect
IsDialogMessageA
IsIconic
IsWindow
MessageBeep
MessageBoxA
MoveWindow
OemToCharA
PeekMessageA
ReleaseDC
SendMessageA
ShowWindow
TranslateMessage
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_DISCARDABLE