Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
36d2d31ba36226e1a9e7e5874de4465a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
36d2d31ba36226e1a9e7e5874de4465a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
36d2d31ba36226e1a9e7e5874de4465a_JaffaCakes118
Size
183KB
MD5
36d2d31ba36226e1a9e7e5874de4465a
SHA1
94f3913137e23ecd2f6d39d15d481f8986e50f90
SHA256
12bd3e6eb7161205dd2891b254b6a9576878c6b7902732f59bac8bbf37bbefa4
SHA512
54943cc9eb51ee2a68ac9bc6529ab6eeb728d4afdd5541a3a373c9156587d23f7aeb0d595d7393ef1df18ed11a33c1a0a5bfc20b9a69800919d51c43b732c058
SSDEEP
3072:LDFQw9gBuNvfOfDtpqP7CjI7uxSav/Dp1/toOY93S7vp6t5bFguFgT:Hl9/NeyzMIyJdBC7rBFguFs
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FlushViewOfFile
SetFileAttributesA
GetDriveTypeW
OpenMutexA
RtlFillMemory
SetProcessWorkingSetSize
SetFileApisToOEM
IsBadReadPtr
WaitForMultipleObjects
EnumSystemCodePagesA
GetFileSize
Beep
SetConsoleFont
VirtualAlloc
LocalLock
LocalAlloc
Sleep
GetConsoleScreenBufferInfo
lstrlenW
IsDebuggerPresent
EnumSystemLanguageGroupsA
IsSystemResumeAutomatic
GetProcessIoCounters
FillConsoleOutputAttribute
LocalSize
lstrcatW
CompareFileTime
FileTimeToDosDateTime
GetCurrentThreadId
CancelDeviceWakeupRequest
WinExec
OpenSemaphoreA
GetCurrentProcess
GetGeoInfoA
lstrcpynW
TerminateJobObject
GetWriteWatch
CreateProcessW
GetCPInfoExA
ReadConsoleOutputAttribute
ExpandEnvironmentStringsA
SetConsoleCP
GetProcAddress
LoadLibraryExA
SetLastError
GetCommandLineA
FindNextVolumeMountPointW
HideCaret
CharPrevW
GetAsyncKeyState
GetWindowLongW
UpdateWindow
SendIMEMessageExW
SetWindowStationUser
DestroyAcceleratorTable
InsertMenuA
GetDC
GetMonitorInfoA
AnimateWindow
GetDlgItem
UserHandleGrantAccess
DlgDirSelectComboBoxExA
SoftModalMessageBox
ScrollWindowEx
IMPGetIMEW
CheckRadioButton
EnumDisplaySettingsExW
CreateMDIWindowW
CreateWindowExA
DestroyIcon
EnableWindow
RegisterClipboardFormatW
DdeCreateDataHandle
DrawTextExA
DdeEnableCallback
LockWindowUpdate
GetWindowTextA
TabbedTextOutW
RegisterShellHookWindow
GetWindowContextHelpId
IsCharUpperW
UnhookWindowsHook
RegisterLogonProcess
BroadcastSystemMessage
WINNLSEnableIME
SetCursorContents
EnumWindowStationsA
TranslateMessage
IsCharAlphaW
SetProgmanWindow
SetSysColorsTemp
StartServiceCtrlDispatcherA
StopTraceW
EncryptionDisable
SetEntriesInAclA
RegDeleteValueW
CryptEncrypt
QueryServiceStatusEx
WmiOpenBlock
FreeInheritedFromArray
CryptGetUserKey
AdjustTokenGroups
WmiQuerySingleInstanceA
WmiNotificationRegistrationW
MakeAbsoluteSD
LsaICLookupSids
I_ScSendTSMessage
LsaOpenTrustedDomain
AssocQueryStringByKeyW
PathRemoveArgsW
PathIsDirectoryW
SHCreateStreamOnFileW
StrToIntA
StrToIntExW
ImageList_AddMasked
ImageList_Read
LBItemFromPt
ImageList_DragMove
ImageList_SetFilter
ImageList_SetBkColor
ImageList_BeginDrag
CoFileTimeNow
CoInitializeEx
StringFromCLSID
CoGetClassObject
GetClassFile
CoGetPSClsid
CoGetCallerTID
CLSIDFromString
CoDisconnectObject
VerLanguageNameW
GetFileVersionInfoA
CoInternetCreateSecurityManager
CreateAsyncBindCtx
UrlMkGetSessionOption
RegisterBindStatusCallback
URLDownloadToFileW
IsJITInProgress
HlinkGoForward
MimeOleCreateByteStream
MimeOleGetFileInfo
MimeOleSetPropA
MimeOleAlgNameFromSMimeCap
HrGetAttachIconByFile
MimeOleGetFileExtension
MimeOleCreateVirtualStream
EssSecurityLabelEncodeEx
MimeOleSetCompatMode
rewind
_fsopen
_execve
_strspnp
_strinc
_locking
_amsg_exit
_scalb
_isnan
_getdrive
_CIpow
_mbsnicmp
_ismbcprint
UnloadPerfCounterTextStringsA
InstallPerfDllW
??_Dostream_withassign@@QAEXXZ
??4fstream@@QAEAAV0@AAV0@@Z
?setbuf@streambuf@@UAEPAV1@PADH@Z
??4istream_withassign@@QAEAAVistream@@ABV1@@Z
?open@fstream@@QAEXPBDHH@Z
?delbuf@ios@@QBEHXZ
??0Iostream_init@@QAE@XZ
?setbuf@ifstream@@QAEPAVstreambuf@@PADH@Z
?pbump@streambuf@@IAEXH@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ