Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
347afb83305a09bf86a67913dba4c4f4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
347afb83305a09bf86a67913dba4c4f4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
347afb83305a09bf86a67913dba4c4f4_JaffaCakes118
Size
65KB
MD5
347afb83305a09bf86a67913dba4c4f4
SHA1
786ddd310e35528755d39a905d0f55bc692783e5
SHA256
fd1eeaa328285e462a38283914c866cde53505ef481c2aebe3c671d442ad2ffe
SHA512
da1cef4097b855c06a1f3a3012742f51c4cc79ff9d0de444b498d25a67bc670bd1a2fa2a83da2f798dbc5b2366670ca64f941d0bb7096e869f2a497a6f5aac06
SSDEEP
1536:XKKjs3dDm5ysl4tv1iV16v1f1rp4iDsDTbp:6s0EyslwAnC1fROiD8Xp
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DeregisterEventSource
IsTextUnicode
ObjectDeleteAuditAlarmA
CryptSignHashA
CryptContextAddRef
RevertToSelf
GetAclInformation
GetServiceDisplayNameA
AllocateAndInitializeSid
BuildSecurityDescriptorA
EnumDependentServicesA
GetSecurityDescriptorControl
RegUnLoadKeyA
RegOpenKeyA
CryptSetKeyParam
BackupEventLogA
SetEntriesInAuditListA
OpenEventLogA
PrivilegeCheck
GetNumberOfEventLogRecords
CopySid
AccessCheck
ChangeServiceConfigA
ControlService
SetServiceStatus
CryptGetKeyParam
CryptHashSessionKey
RegSaveKeyA
InitializeAcl
CryptEncrypt
GetTrusteeTypeA
RegDeleteValueA
FindFirstFreeAce
CryptDestroyHash
GetSidSubAuthority
RegFlushKey
GetMultipleTrusteeA
EndMenu
ArrangeIconicWindows
SwitchToThisWindow
RegisterWindowMessageA
SetCaretBlinkTime
DispatchMessageA
WinHelpA
DdeClientTransaction
GetKBCodePage
TranslateAccelerator
CharToOemBuffA
InsertMenuItemA
GetWindowWord
MapVirtualKeyExA
UnhookWinEvent
SetProcessWindowStation
IsWindowUnicode
FindWindowExA
DrawTextExA
GetIconInfo
GetDC
InSendMessage
SetMenuDefaultItem
CopyIcon
TileWindows
LookupIconIdFromDirectory
BringWindowToTop
UnpackDDElParam
EnumPropsExA
DdeQueryStringA
DdeUnaccessData
EnumDisplayMonitors
DestroyAcceleratorTable
GetMenuItemCount
DrawMenuBar
DrawCaption
ShowCursor
OemToCharA
DlgDirSelectExA
PackDDElParam
DrawFrame
RedrawWindow
CascadeWindows
SetSysColors
EnableScrollBar
PostQuitMessage
GetUserObjectSecurity
RegisterDeviceNotificationA
GetNextDlgTabItem
ToUnicodeEx
IMPGetIMEA
SetMessageExtraInfo
DestroyMenu
ReadConsoleOutputA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ