Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3d0bd5d430364843dc2acc7c1b7ff4c4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d0bd5d430364843dc2acc7c1b7ff4c4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
3d0bd5d430364843dc2acc7c1b7ff4c4_JaffaCakes118
Size
118KB
MD5
3d0bd5d430364843dc2acc7c1b7ff4c4
SHA1
2b2136adfdb6ce8b41a82cf84e59cc2c22ba7961
SHA256
dfcbadc27cf046d78881f52650f7fb99e9c9985b700e114e9c59d6204c53d138
SHA512
586372ecf4f59d4948b96d2cd26cda261a2f16d8ac43e11af9193fa20b3f27d6b8d74b9a97078326c9c48e02a0350b76bdcae0993b0b4b53807d83b7b63a40ab
SSDEEP
3072:cn1Z6JG6xHyU2D54gvRbDEJkG+Gt1Pyd5zIDZeoVxAJg:cnXcG6gU2DHZ/EZ+myd5z3oVKe
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateThread
DeleteFileA
DuplicateHandle
ExitProcess
GetBinaryTypeA
GetCommandLineA
GetCurrentProcess
GetDriveTypeA
GetFileAttributesA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetTickCount
CreateProcessA
GlobalAlloc
GlobalFree
OpenProcess
ReadFile
ResumeThread
SetEvent
SetFilePointer
SetLastError
TerminateProcess
WaitForSingleObject
WriteProcessMemory
HeapAlloc
RaiseException
CreatePipe
CreateFileA
LoadLibraryA
CreateEventA
GetVolumeInformationA
CloseHandle
VirtualAlloc
VirtualFree
HeapFree
WriteFile
GetTempFileNameA
GetTempPathA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateDirectoryA
ExpandEnvironmentStringsA
GetThreadContext
SetThreadContext
GetVersionExA
GetProcAddress
HeapCreate
TranslateMessage
SendMessageA
RegisterClassA
PostMessageA
PeekMessageA
GetMessageA
DispatchMessageA
CreateWindowExA
DefWindowProcA
MessageBoxA
RegCloseKey
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
CoTaskMemFree
SHGetSpecialFolderLocation
SHGetPathFromIDListA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ