Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3b1822a94695862947273bb0a20b5d7a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b1822a94695862947273bb0a20b5d7a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
3b1822a94695862947273bb0a20b5d7a_JaffaCakes118
Size
255KB
MD5
3b1822a94695862947273bb0a20b5d7a
SHA1
045b6db63b7f86b0745ab5d2dc38b0a21774defa
SHA256
8914b940f5f65c22e691ccc232350b5b1291f2e8ac71d7a722b10eb853bc9d26
SHA512
e740da6b45ee22e84886ef6315f72d5feb76a01f1e20f393b8438a24c75f2c4a9727839f52d3d8694a93e35e172f2b3ad3e646eb740ac0922167794eab0adfeb
SSDEEP
3072:6iG47vmfhnT1unjf9tLEciSWEqF1R/plSaRCKj8Hn7z89NbgjZrTtM8M8Z1yuxZq:6i0J4H+rRZRxjc74DbgjNTiwr+
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcmpi
FatalAppExitW
GetCurrentDirectoryW
SetComputerNameW
GetLogicalDrives
LoadLibraryExA
GlobalFindAtomA
GetLogicalDriveStringsW
GetExitCodeProcess
CreateMailslotW
SetCurrentDirectoryW
lstrcpynA
TlsAlloc
DisconnectNamedPipe
GetShortPathNameA
FatalAppExitA
GetVersion
GetEnvironmentVariableA
GetProcAddress
EnumDateFormatsW
AddAtomW
QueryPerformanceCounter
FileTimeToDosDateTime
SearchPathW
CreateMutexW
GetEnvironmentStringsW
GetEnvironmentStringsA
GetCurrentProcessId
GetDiskFreeSpaceA
LoadCursorA
DialogBoxIndirectParamW
CharLowerA
RemoveMenu
UnregisterClassA
GetMenuState
DestroyIcon
CreateDialogIndirectParamW
AdjustWindowRect
SendDlgItemMessageW
IsIconic
GetCapture
mouse_event
SetDlgItemInt
RegisterClassA
GetMenuItemRect
DefWindowProcW
PeekMessageW
SetTimer
SetCapture
CreateDesktopW
GetActiveWindow
MessageBoxA
GetCapture
CopyIcon
GetSysColor
SetFocus
DialogBoxParamW
DialogBoxIndirectParamA
keybd_event
StretchDIBits
CreateScalableFontResourceA
CreateFontIndirectW
CreateRoundRectRgn
CreateBitmap
GetMetaFileA
CreateFontIndirectExW
CreateFontIndirectExA
GetTextExtentPointA
CryptContextAddRef
StrCmpNA
StrNCmpA
ShellExecuteExA
StrCmpNIA
StrRChrIA
ShellExecuteEx
FreeIconList
StrStrA
VarI8FromBool
VarDateFromUdate
VarEqv
VarUI4FromR8
CreateStdDispatch
CM_Modify_Res_Des_Ex
SetupDiCallClassInstaller
CMP_WaitNoPendingInstallEvents
CM_Open_Class_KeyA
SetupDiGetCustomDevicePropertyA
SetupInstallServicesFromInfSectionA
SetupDiGetClassDevsExA
SetupQueueCopyIndirectA
CM_Reenumerate_DevNode_Ex
MyMalloc
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ