Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
27ff56d34d0ed9c6cee52f3e59150e4c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27ff56d34d0ed9c6cee52f3e59150e4c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Target
27ff56d34d0ed9c6cee52f3e59150e4c_JaffaCakes118
Size
146KB
MD5
27ff56d34d0ed9c6cee52f3e59150e4c
SHA1
e11f59cfecc1c28635f819964a61fb8d1ddb7de8
SHA256
e705f9a48581d3b3be194de9afc7f982c1c94ff85a404e72fd77377339f3f604
SHA512
bc82ad477a79d84de1891465134dd4ee13de4143e4debcdf3ba6651b65b9b51491447d9ebdb1bb19efc6761ed7106355a6473975b50109a7420eb27a37b16526
SSDEEP
1536:R2b/D++qAWq9q9PsEYo1Lk/Clna5a0RwPu9:YX+eo9PqQ7Bua0+i
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHDeleteKeyA
StrStrIA
GetModuleFileNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
lstrcatA
DeleteFileA
RemoveDirectoryA
GetTempPathA
LoadLibraryA
ReadFile
WriteFile
lstrcmpiA
FreeLibrary
GetFileSize
lstrcmpA
WritePrivateProfileStringA
LoadLibraryExA
SetFileAttributesA
MultiByteToWideChar
GetSystemDirectoryA
MoveFileA
CopyFileA
SetFilePointer
FindFirstFileA
FindClose
CreateProcessA
WaitForSingleObject
GetPrivateProfileSectionNamesA
GetCurrentProcess
LocalFree
GetVersionExA
GlobalAlloc
GlobalFree
GetWindowsDirectoryA
HeapAlloc
GetProcessHeap
ExitProcess
GetDateFormatA
GetTimeFormatA
GetCommandLineA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
lstrcpynA
CreateDirectoryA
lstrlenA
lstrcpyA
CloseHandle
CreateFileA
GetFileAttributesA
HeapFree
IsCharUpperA
LoadStringA
FindWindowA
SendMessageA
wvsprintfA
IsCharAlphaA
IsCharAlphaNumericA
WaitForInputIdle
DispatchMessageA
TranslateMessage
PeekMessageA
CreateWindowExA
RegisterClassA
LoadCursorA
LoadIconA
DefWindowProcA
PostQuitMessage
GetDesktopWindow
CharLowerA
wsprintfA
GetStockObject
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegFlushKey
RegQueryValueExA
RegEnumValueA
OpenProcessToken
DuplicateTokenEx
AllocateAndInitializeSid
GetLengthSid
RegCreateKeyExA
RegDeleteValueA
ShellExecuteA
CoCreateInstance
OleUninitialize
OleInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ