Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
18d1228b49529008e584bdaaab9bd1ec_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
18d1228b49529008e584bdaaab9bd1ec_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Target
18d1228b49529008e584bdaaab9bd1ec_JaffaCakes118
Size
174KB
MD5
18d1228b49529008e584bdaaab9bd1ec
SHA1
9611453be1cbfdf5fe8c93248b800fb860df8165
SHA256
77651653696c0e2a3efef8b61fd25dd4acedefdd272009e06f6a3d4ff474d173
SHA512
d83bdfa1cc2566e15f4d62e3dce22c7a971d06bf65e097d3d2cc2734659229cd872c6b28f27ac0f9362fd88341db4315d800d7b132a157eec57832c6f05a9d49
SSDEEP
3072:y5vJZnfwRZ58JrSeJkCFKPBvGTC2Cto1s/eF:yff4/XCFwBvGnz1j
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
GetLastError
lstrlenA
WaitForSingleObject
CreateThread
CreateEventA
InterlockedIncrement
GetModuleFileNameA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
InitializeCriticalSection
Sleep
GetCurrentThreadId
GetCommandLineA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
GetConsoleMode
RaiseException
lstrlenW
MultiByteToWideChar
OpenEventA
SetEvent
CloseHandle
InterlockedDecrement
WideCharToMultiByte
lstrcmpiA
GetModuleHandleA
LoadLibraryExA
GetProcAddress
GetConsoleCP
SetStdHandle
SetFilePointer
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
LocalFree
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
VirtualFree
HeapDestroy
HeapCreate
ExitProcess
WriteFile
GetStdHandle
GetCPInfo
GetOEMCP
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
CharNextA
wsprintfA
PostThreadMessageA
DefWindowProcA
RegisterClassA
CreateWindowExA
GetMessageA
DispatchMessageA
UnregisterClassA
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
IsTextUnicode
RegOpenKeyA
RegSetValueExA
RegCloseKey
RegEnumKeyExA
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemFree
StringFromGUID2
CoUninitialize
CoInitialize
CoCreateInstance
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysFreeString
SysAllocString
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ