Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
24bcae8b11c5dff4622bba8231e597d3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24bcae8b11c5dff4622bba8231e597d3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
24bcae8b11c5dff4622bba8231e597d3_JaffaCakes118
Size
876KB
MD5
24bcae8b11c5dff4622bba8231e597d3
SHA1
02fdf2b7c2f5a2640fba96436874e544a0ae6aad
SHA256
68b54725b535b64f4cbd6c6c50f3b7a9969a047820aa7798bc45a3a556ce8627
SHA512
c188c6ef838f8966d5ffad5fe0d397d19c2f3c5b5638458e2d93381d3be89c2b95c115bfa2ebb5c403b1f5d16799db527ecc89a729b168881e43bbc5eabea492
SSDEEP
24576:DiuUm/SUG9UwSA1/DLRpiN/LFRM+z4NJtEAm:DgazWbSABLRpiNTM+sNJt9m
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
UpdateResourceA
GetOverlappedResult
UnlockFileEx
WriteProcessMemory
GetCPInfoExA
Module32First
SetProcessShutdownParameters
FindCloseChangeNotification
GetPrivateProfileIntA
GetModuleFileNameA
SetTimeZoneInformation
SetStdHandle
GlobalAddAtomA
CreateDirectoryExA
Thread32Next
SetFileApisToOEM
GenerateConsoleCtrlEvent
ClearCommBreak
GetSystemPowerStatus
HeapWalk
FatalExit
BuildCommDCBA
lstrcat
Beep
LocalShrink
FlushConsoleInputBuffer
OpenFileMappingA
WriteConsoleOutputAttribute
FileTimeToLocalFileTime
GetTimeZoneInformation
CreateThread
FindAtomA
SetConsoleOutputCP
UTRegister
SwitchToFiber
IsValidCodePage
CreateFileMappingA
VirtualFree
SetConsoleActiveScreenBuffer
GetDriveTypeA
GetFileAttributesExA
WriteProfileStringA
GetNamedPipeHandleStateA
ReadConsoleA
TerminateThread
InitializeCriticalSection
GetCurrentProcessId
GlobalGetAtomNameA
ContinueDebugEvent
DeleteFileA
GetCurrentThreadId
BackupSeek
FlushInstructionCache
MapViewOfFile
CreateFiber
MulDiv
ReadProcessMemory
GlobalReAlloc
SystemTimeToTzSpecificLocalTime
lstrcmpi
PathMakePrettyA
PathQuoteSpacesA
StrChrIA
PathFindOnPathA
PathFileExistsA
StrFormatByteSize64A
UrlCombineA
HashData
UrlIsOpaqueA
PathIsRelativeA
UrlGetLocationA
SHRegWriteUSValueA
SHRegOpenUSKeyA
PathIsUNCA
SHAutoComplete
SHRegEnumUSKeyA
PathIsFileSpecA
PathStripToRootA
PathGetDriveNumberA
StrCSpnA
PathRemoveBlanksA
StrRChrIA
ColorHLSToRGB
SHCreateStreamWrapper
StrSpnA
PathAppendA
SHRegCreateUSKeyA
AssocQueryStringA
PathCommonPrefixA
StrIsIntlEqualA
AllocateAndInitializeSid
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ