Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3323f4758deb7c359078e734a86eae19_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3323f4758deb7c359078e734a86eae19_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
3323f4758deb7c359078e734a86eae19_JaffaCakes118
Size
48KB
MD5
3323f4758deb7c359078e734a86eae19
SHA1
b060de85972d30bccba40f38e16eb95f56050f01
SHA256
95a54d4d161855fc5049d805a0776b6d0463aab8e75c00914cf02b31559a9c25
SHA512
87f9d7f7d9462ac521a47c2e8d31637f0b6104db1c19f36987dec33e47176b2fc3a26cecc2208bb31959dbfc997a024d9ce5cfbbaf9d776707ae66db8c537006
SSDEEP
1536:+fv4FNZh1j9z4LW4651XM7YSGl1hm6OieQqwCoO:+YT0LWRfM7YSGl11OidVO
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
??1PString@@QAE@XZ
??0PString@@QAE@PBD@Z
??BPString@@QAEPADXZ
??0PString@@QAE@XZ
??4PString@@QAEAAV0@ABV0@@Z
??HPString@@QBE?AV0@ABV0@@Z
?find@PString@@QBEHABDH@Z
?subString@PString@@QBE?AV1@HH@Z
??0PString@@QAE@ABV0@@Z
??BPString@@QBEPBDXZ
?getString@PProfile@@QAE?AVPString@@ABV2@0H0@Z
?getIntVal@PProfile@@QAEKABVPString@@0K@Z
??0PDirectory@@QAE@ABVPString@@@Z
??1PProfile@@QAE@XZ
?setFileSpec@PDirectory@@QAEXABVPString@@@Z
?open@PDirectory@@QAEHXZ
?getFiles@PDirectory@@QBE?AV?$PList@VPPathString@@@@XZ
??1?$PList@VPPathString@@@@UAE@XZ
?length@?$PList@VPPathString@@@@QBEJXZ
??0PPathString@@QAE@ABV0@@Z
??R?$PList@VPPathString@@@@QAEAAVPPathString@@J@Z
?getFullName@PPathString@@QBEABVPString@@XZ
?copy@PFile@@SAHABVPString@@0H@Z
?getPath@PPathString@@QBE?AVPString@@XZ
?getFile@PPathString@@QBEABVPString@@XZ
??1PPathString@@QAE@XZ
??0PProfile@@QAE@ABVPString@@@Z
??1PDirectory@@QAE@XZ
?getPath@PLanguage@@SA?AVPString@@H@Z
ord963
ord958
ord5666
ord5668
ord6446
ord1729
ord4688
ord5139
ord3732
ord5636
ord4589
ord6780
ord5497
ord2074
ord5585
ord4650
ord1496
ord4331
ord1752
ord1755
ord6388
ord3344
ord1678
ord1809
ord1810
ord2208
ord5309
ord5152
ord4617
ord5615
ord5924
ord4952
ord4029
ord589
ord793
ord310
ord820
ord2616
ord6811
ord3414
ord300
ord3659
ord4667
ord4890
ord3110
ord6001
ord5646
ord5663
ord4981
ord4333
ord2447
ord5659
ord5657
ord3209
ord2087
ord4199
ord5813
ord6721
ord5533
ord1046
ord4165
ord6018
ord2206
ord2251
ord4733
ord6781
ord4159
ord6783
ord4409
ord4434
ord2274
ord1668
ord3346
ord6391
ord1497
ord4638
ord5647
ord967
ord3480
ord595
ord1108
ord1137
ord1938
ord2057
ord4431
ord817
ord405
ord664
ord2209
ord3390
ord6740
ord2591
ord4116
ord6559
ord2899
ord2069
ord4502
ord2360
ord1387
ord1183
ord2539
ord2372
ord4311
ord2633
ord2628
ord2612
ord2635
ord2623
ord2605
ord2607
ord2625
ord2375
ord2368
ord1644
ord6784
ord4160
ord6782
ord3671
ord5389
ord6356
ord3218
ord1446
ord5608
ord2139
ord1792
ord1791
ord1728
ord5633
ord2766
ord2978
ord3107
ord4714
ord2961
ord3135
ord2769
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord4895
ord4668
ord3506
ord3987
ord910
ord6257
ord2904
ord601
ord316
ord4993
ord639
ord965
ord969
ord2610
ord2630
ord2620
ord2614
ord3277
ord2618
ord374
ord1276
ord800
ord611
__CxxFrameHandler3
_setmbcp
_controlfp_s
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
_chdir
_makepath_s
_splitpath_s
memset
UnhandledExceptionFilter
GetFileAttributesA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
GetModuleFileNameA
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
CreateDirectoryA
AppendMenuA
GetSystemMenu
LoadIconA
EnableWindow
SendMessageA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ