Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
14fa8708e5b8bb49c0e67c4dba765fce_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
14fa8708e5b8bb49c0e67c4dba765fce_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
14fa8708e5b8bb49c0e67c4dba765fce_JaffaCakes118
Size
192KB
MD5
14fa8708e5b8bb49c0e67c4dba765fce
SHA1
932facfdc88f7ade240de426960547f494c72ac0
SHA256
8446b5562065b2262b9f9f3a583df3630c2a07b60ee813b853bde372136b4564
SHA512
92ffd8e0a4fbddb2a585d6c533fdc7be2f66039e924994ad7039f8ea13f7639e38014f9b2e503331a92f3293c40e5455e12a73c6b7dcc89a1f42fd8f6bb81e8c
SSDEEP
3072:RnS2RBvS1HXrP97TkUttGR3qGk6Tzsk12XhaJoTJo:RKZXL9cUg3NVTzsk12RCo9o
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
lstrlenA
lstrcmpiA
GetSystemPowerStatus
Sleep
InterlockedIncrement
GetModuleFileNameA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
GetVersionExA
GetProcAddress
LoadLibraryA
CloseHandle
GetCurrentThreadId
GetCommandLineA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
SetFilePointer
LCMapStringW
LCMapStringA
GetLastError
DeleteCriticalSection
InitializeCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
CompareFileTime
CreateMutexA
InterlockedDecrement
GetStringTypeW
GetStringTypeA
GetOEMCP
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
EnterCriticalSection
LeaveCriticalSection
LocalFree
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
VirtualFree
HeapDestroy
HeapCreate
ExitProcess
WriteFile
GetStdHandle
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
UnregisterClassA
EnumDisplaySettingsA
PostThreadMessageA
RegisterClassA
GetMessageA
DispatchMessageA
SetTimer
PostQuitMessage
DefWindowProcA
CreateWindowExA
KillTimer
CharNextA
RegDeleteValueA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegQueryInfoKeyA
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoInitialize
CoSuspendClassObjects
CoTaskMemFree
StringFromGUID2
CoRegisterClassObject
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysFreeString
SysAllocString
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE