Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
24001ebf521472b0465aedc0a542ef13_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
24001ebf521472b0465aedc0a542ef13_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
24001ebf521472b0465aedc0a542ef13_JaffaCakes118
Size
876KB
MD5
24001ebf521472b0465aedc0a542ef13
SHA1
e1a31ccbdd1814c161c7ca4a64d4fed5bdfe61b7
SHA256
52d982752da60aba0b3f8a9c7b0de122e500a7b11250556de0c7bc1a4fa02064
SHA512
d7ff06feccd86341b6ae659d51d213ffe39bfe17197a9485dba6cd8858331208c2a51cf72d647bd8164fba4888f06370f5467ec47115eb88e68fe98af2eca57d
SSDEEP
24576:N+5GZbkE/4E+AUZbj2gRMsYGzPgMuAvMh2r4QsDv:N+5GxP/P+AHlsaAkho6
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHDeleteValueA
PathIsRelativeA
UrlGetLocationA
PathMakePrettyA
StrCSpnA
PathGetDriveNumberA
PathFindOnPathA
SHIsLowMemoryMachine
UrlCombineA
PathAppendA
StrFormatByteSize64A
PathRemoveBlanksA
PathCommonPrefixA
ColorHLSToRGB
PathSearchAndQualifyA
StrToIntExA
StrSpnA
StrChrIA
SHRegCreateUSKeyA
PathFileExistsA
StrRChrIA
StrIsIntlEqualA
SHRegOpenUSKeyA
AssocQueryStringA
PathIsFileSpecA
SHCreateStreamWrapper
SHAutoComplete
PathStripToRootA
HashData
SHRegWriteUSValueA
PathIsUNCA
UrlIsOpaqueA
CompareStringA
CreateNamedPipeA
AddAtomA
VirtualQueryEx
FlushInstructionCache
InterlockedCompareExchange
GetFileAttributesExA
GetProfileIntA
ReadFileEx
GetComputerNameA
GetStringTypeExA
IsValidCodePage
_llseek
SearchPathA
lstrcat
SetNamedPipeHandleState
MapViewOfFile
GetSystemPowerStatus
TransactNamedPipe
Module32First
SetStdHandle
GetConsoleTitleA
CreateFileMappingA
Process32Next
SetVolumeLabelA
GetDiskFreeSpaceA
FillConsoleOutputAttribute
GetLongPathNameA
LocalShrink
SetMailslotInfo
FindResourceA
IsBadWritePtr
DeleteFileA
GetTempPathA
GetDriveTypeA
WriteFile
WaitForSingleObject
GetNumberFormatA
UpdateResourceA
InterlockedIncrement
GlobalFindAtomA
EnumResourceLanguagesA
CallNamedPipeA
HeapUnlock
TlsSetValue
PurgeComm
GetCommState
VirtualLock
SetLocalTime
SetTapeParameters
GetLocalTime
ResetEvent
SetFilePointer
CreateDirectoryExA
GetCurrentThreadId
HeapCompact
SetTimeZoneInformation
HeapDestroy
SetEntriesInAuditListA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ