Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
17a540949b5b7f856f60d7ed9959612b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17a540949b5b7f856f60d7ed9959612b_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Target
17a540949b5b7f856f60d7ed9959612b_JaffaCakes118
Size
3.2MB
MD5
17a540949b5b7f856f60d7ed9959612b
SHA1
035aec9d58b8023cfaaa33c76238b4879d36ac67
SHA256
d1d4e39df37c7d3453daafb7726fa4bad8f7c50049fd9bb36e018ffcc4e4b602
SHA512
5d816c2cdc23ffd09fd4f30ed80e0df38acff6b6ecb96e0277956c0acb5bb6b909156d0465f89bd086f73c8cc36bce60033414aea5dbfe6a4d8eab6e273d60c9
SSDEEP
98304:6U1joap4ZsmaBlhT54UtILcSRnv2bda2tg2wKCB6:6U18ap4edlhT542ILcWAd5Ic
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
ReadFile
SetFilePointer
WriteFile
GetDiskFreeSpaceA
CloseHandle
SetFileTime
CreateFileA
CreateDirectoryA
SetFileAttributesA
CopyFileA
GetLastError
CreateProcessA
GetShortPathNameA
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
GetTempPathA
GetFileSize
GetModuleFileNameA
GetVersion
FreeLibrary
GetProcAddress
GetVersionExA
LoadLibraryExA
LoadLibraryA
LoadLibraryExW
GetCurrentProcess
SetEndOfFile
LCMapStringW
LCMapStringA
GetSystemInfo
VirtualProtect
FlushFileBuffers
SetStdHandle
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetCPInfo
ExitProcess
GetModuleHandleA
TerminateProcess
GetExitCodeProcess
WaitForSingleObject
MultiByteToWideChar
HeapFree
HeapAlloc
WideCharToMultiByte
GetStartupInfoA
GetCommandLineA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
InitializeCriticalSection
RtlUnwind
HeapSize
InterlockedExchange
VirtualQuery
ShowWindow
CreateDialogParamA
PostQuitMessage
SetWindowTextA
GetDlgItemTextA
SetDlgItemTextA
DestroyWindow
EndDialog
GetDlgItem
MessageBoxA
SendMessageA
ShellExecuteExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ