Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
0828ec6759c14555b9e7eec98a883a11_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0828ec6759c14555b9e7eec98a883a11_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
0828ec6759c14555b9e7eec98a883a11_JaffaCakes118
Size
210KB
MD5
0828ec6759c14555b9e7eec98a883a11
SHA1
2f975aa947799ada48e9e786ed4ab751e6496c9b
SHA256
938c9f529944bdbf3c55e9bf5b6bcf12dcdb2fff566027a63860c5e2fbfc839d
SHA512
b95eacf84645acdb65a4f6995c1be74caff6a3590b4e6846b9670b7197f1ac14ed35688a9933b224400d5b9cdcc2ea9d53e24871ef3f6c89fc138d2cc47ddf84
SSDEEP
6144:VcvEFHvQs+gla9hoqBKGSF2TmkTdpytRI:B0Hh5BKRFylTdcRI
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetHandleInformation
CreateMailslotA
QueryPerformanceCounter
GetShortPathNameW
CreateMutexW
AddAtomA
GlobalAlloc
MultiByteToWideChar
GetModuleHandleA
GetTempPathW
CreateDirectoryW
LoadResource
ReplaceFileA
GetFileTime
EnumTimeFormatsW
EnumDateFormatsW
MoveFileA
OpenMutexA
GetWindowsDirectoryW
EnumTimeFormatsA
GetCurrentProcessId
SearchPathW
IsValidLocale
GetLocalTime
CopyFileA
GetProcessHeap
GetProcAddress
QueryPerformanceFrequency
BeginUpdateResourceW
FreeResource
GetCalendarInfoA
InitializeCriticalSection
CreateFileA
FatalAppExitA
DosDateTimeToFileTime
OpenEventW
GetEnvironmentStringsA
GetOEMCP
Beep
IsValidCodePage
SetCurrentDirectoryW
WaitForMultipleObjects
GetCalendarInfoW
GetCurrentProcess
GetSystemDirectoryA
lstrcpynA
CreateThread
OpenWaitableTimerW
GetCapture
SetWindowRgn
OffsetRect
GetClassNameA
GetClassNameW
FillRect
FlashWindow
LoadMenuA
EndDialog
RegisterWindowMessageA
CopyImage
SetActiveWindow
GetSysColorBrush
SetDlgItemTextA
CreateDesktopA
GetMenuStringA
GetClassInfoW
GetWindowLongW
GetDC
FrameRect
wsprintfA
AdjustWindowRect
GetTextCharacterExtra
PtInRegion
SetICMMode
GetTextExtentPointI
CombineRgn
SetLayout
GetDeviceCaps
CloseEnhMetaFile
GetPath
StartPage
GetROP2
CreateFontIndirectExA
SetTextCharacterExtra
SelectClipRgn
RegCreateKeyW
RegDeleteValueW
RegCreateKeyExW
RegQueryValueW
RegDeleteKeyW
RegEnumValueW
RegQueryInfoKeyW
InternetInitializeAutoProxyDll
InternetGetCookieExW
FindNextUrlCacheContainerA
GopherGetAttributeW
FtpPutFileA
InternetSetOptionExA
InternetAutodial
FindFirstUrlCacheEntryA
CreateUrlCacheGroup
InternetWriteFileExA
FtpFindFirstFileA
RetrieveUrlCacheEntryFileA
InternetConfirmZoneCrossingA
InternetSetPerSiteCookieDecisionW
DeleteUrlCacheContainerW
InternetConfirmZoneCrossing
HttpEndRequestA
_RegisterEventSource_@8
_SetWindowsHookEx_@16
_CreateWindowEx@48
_EnumWindowStations_@8
_SetWindowsHook_@8
_QueryServiceConfig_@16
__lwrite_@12
_GetCharWidthFloat_@16
_ShellAbout_@16
_ObjectOpenAuditAlarm_@48
_OpenDesktop_@16
_CreateEvent_@16
_ExtractIconEx_@20
_OpenFile_@12
_wvsprintf_@12
_CharToOem_@8
_lstrcat_@8
_CreateWindowStation_@16
_GetPrivateProfileSectionNames_@12
_GetWindowLong@8
_GetICMProfile_@12
WSAAsyncGetHostByName
gethostbyaddr
ntohl
getsockname
getnetbyname
select
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ