Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
3d7a15c5e35ad587cf973a62c8b01e37_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d7a15c5e35ad587cf973a62c8b01e37_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
3d7a15c5e35ad587cf973a62c8b01e37_JaffaCakes118
Size
876KB
MD5
3d7a15c5e35ad587cf973a62c8b01e37
SHA1
14ff27cff436860eb24de0e85cb67c547500327e
SHA256
a90183449c71e4593f73fc1182f89a8abb1f1aeeb265911c912db7d57141b51d
SHA512
197b2e75ca1b76056445a2e312aa5b23e972be40b1eba51c31b9b2fa6d1768013ff23827efcc0f0735a48b170c37ce48464336994597ea60b9332502cb99c23a
SSDEEP
24576:0BZ3OpKEAXXjuA6Zrrz9bGm7H8ezcgTe5pj:0Dm7AnjuB9cbg4j
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTimeZoneInformation
_lclose
WriteProcessMemory
GetFullPathNameA
SetConsoleWindowInfo
SystemTimeToTzSpecificLocalTime
HeapDestroy
WaitCommEvent
SwitchToFiber
GetLocalTime
Heap32First
GetTickCount
SetTimeZoneInformation
BackupSeek
MoveFileA
EnumResourceTypesA
DeleteFileA
CreateThread
EnumDateFormatsA
CreateConsoleScreenBuffer
GetProfileStringA
ReadProcessMemory
GetOverlappedResult
FlushConsoleInputBuffer
EnumSystemLocalesA
LocalLock
_llseek
GetFileTime
VirtualQueryEx
GetSystemTimeAdjustment
GetTapeStatus
SetSystemTime
SearchPathA
SleepEx
GenerateConsoleCtrlEvent
VirtualFree
SetCommTimeouts
LocalFileTimeToFileTime
ResumeThread
SetNamedPipeHandleState
UnlockFileEx
FreeConsole
Module32First
InterlockedIncrement
lstrlen
SetDefaultCommConfigA
GetCurrentDirectoryA
DisconnectNamedPipe
GetUserDefaultLangID
HeapWalk
CreateDirectoryExA
CallNamedPipeA
OpenFileMappingA
GetLongPathNameA
CommConfigDialogA
DebugActiveProcess
SetCommMask
lstrcmpi
FreeLibrary
LocalAlloc
WriteProfileStringA
UrlGetLocationA
PathRemoveBlanksA
PathSearchAndQualifyA
PathMakePrettyA
SHAutoComplete
UrlIsOpaqueA
SHRegCreateUSKeyA
ColorHLSToRGB
StrCSpnA
SHIsLowMemoryMachine
AssocQueryStringA
StrChrIA
StrFormatByteSize64A
PathQuoteSpacesA
StrIsIntlEqualA
HashData
PathCommonPrefixA
SHRegEnumUSKeyA
PathGetDriveNumberA
PathIsUNCA
StrSpnA
PathIsRelativeA
SHRegOpenUSKeyA
PathIsFileSpecA
SHRegWriteUSValueA
SHDeleteValueA
PathAppendA
StrToIntExA
PathFileExistsA
BackupEventLogA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ