Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
0e59c6d19d734fe8ca3298f4b96f48bd_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e59c6d19d734fe8ca3298f4b96f48bd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
0e59c6d19d734fe8ca3298f4b96f48bd_JaffaCakes118
Size
13KB
MD5
0e59c6d19d734fe8ca3298f4b96f48bd
SHA1
1c4488de9af0e84918d4fe97becd64cf4e06310b
SHA256
69dd83ff4e1137fb62fa75d3a18e857538527df2e2800056250f5ec4a71571a4
SHA512
99e062e6385a6ca652bb5b1264003abbe3db93077d39259efd3ca02df2dfa5b91af1b174c7ec0e59cbdd32a443f637ebc3e8d9d2f5c9cb86ba9bd504801ac6c3
SSDEEP
192:pl5zoeTMW6vrkvWxoNsDW1uWL/CldolMGo3OuqoMOdLCisX:pLz7t6AWx4sDWMWLCcMe/oTC
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
vjc.pdb
_encode_pointer
__set_app_type
_unlock
__dllonexit
_lock
__p__fmode
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
__winitenv
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_onexit
_amsg_exit
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
InterlockedCompareExchange
Sleep
InterlockedExchange
IsDebuggerPresent
VJSCCommandLineCompile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE