Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
380a91e467657350a0a85c12fbc31f7c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
380a91e467657350a0a85c12fbc31f7c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
380a91e467657350a0a85c12fbc31f7c_JaffaCakes118
Size
237KB
MD5
380a91e467657350a0a85c12fbc31f7c
SHA1
14abdc5f535a3d65def2f32220ea720f93e83e19
SHA256
ab218c4950b1f82b573598a4bc89d0454b02520f7d72ecc4588d397ba62226fa
SHA512
bb5d40649c1f0d8e42dd8c518c6435c008bc3d47f75925a5aa95002d24070bb153d94004829cb63f90097ae918f549d0353ecc16a0d9204f26ca3f639adff0a0
SSDEEP
6144:RmOce3AeTasoBbNMF1iCJKJVW2vYvDXYa1:RfV3AeroB+ucOv+DXR1
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindResources
LoadSTRINGFromHKCU
LoadSTRING
GetModuleHandleA
CreateProcessA
FreeLibrary
LoadLibraryA
GetVersionExA
CloseHandle
GetLastError
InterlockedDecrement
SearchPathA
CompareFileTime
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
lstrcmpiA
InterlockedIncrement
GetModuleFileNameA
GetModuleHandleW
IsDBCSLeadByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetWindowsDirectoryA
Sleep
CreateMutexA
GetCurrentThreadId
GetCommandLineA
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
GetSystemDefaultLangID
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoA
GetProcAddress
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
InitializeCriticalSectionAndSpinCount
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetStdHandle
WriteFile
HeapCreate
HeapReAlloc
ExitProcess
LCMapStringW
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
VirtualAlloc
TerminateProcess
UnhandledExceptionFilter
VirtualFree
SetUnhandledExceptionFilter
IsDebuggerPresent
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStartupInfoA
VirtualQuery
GetSystemInfo
VirtualProtect
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
RtlUnwind
CharNextW
PostThreadMessageA
UnregisterClassA
wsprintfA
CharNextA
GetWindowLongA
GetCursorPos
EnumDisplayDevicesA
EnumDisplaySettingsA
CreateDialogParamA
CallWindowProcA
RegisterClassExA
UnregisterHotKey
RegisterHotKey
ActivateKeyboardLayout
MapVirtualKeyExA
GetKeyNameTextA
GetKeyboardLayout
GetKeyboardLayoutList
LoadCursorA
GetClassInfoExA
SetWindowLongA
RegisterClassA
CreateWindowExA
GetMessageA
DispatchMessageA
SetTimer
IsWindow
SendMessageA
ShowWindow
PostQuitMessage
PeekMessageA
DefWindowProcA
KillTimer
DestroyWindow
GetDlgItem
GetDesktopWindow
GetWindowRect
SetWindowTextA
MessageBoxA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ShellExecuteExA
CoRevokeClassObject
CoCreateInstance
CoTaskMemRealloc
CoSuspendClassObjects
CoTaskMemAlloc
CoRegisterClassObject
CoTaskMemFree
StringFromGUID2
CoUninitialize
CoInitialize
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
SysStringLen
SysAllocString
SysFreeString
VariantClear
LoadTypeLi
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ