Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
43b1bdd6c683b1b036d1375f9e3208fe_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43b1bdd6c683b1b036d1375f9e3208fe_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
43b1bdd6c683b1b036d1375f9e3208fe_JaffaCakes118
Size
34KB
MD5
43b1bdd6c683b1b036d1375f9e3208fe
SHA1
fad7b83af58c7e32872ec2234d4b080cccdb1866
SHA256
eb3ffab1dae9b408cff81c5f4adcac3bcc6be78d03c06680347b91f33690ce4d
SHA512
1e6db8246b46b85bc74ccb7f6fbe9e866d67bc9f90759efbc440f6794803a36e0dea3a119a644677ed70c54f227cb3323dd272f796394b5705025932a57492c9
SSDEEP
768:l4pH2yr4aDzi+qAoGmgm4lrJBenDWeiCnLvbL5:l2b/D++qAWq9q9Pnnt
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHDeleteKeyA
StrStrIA
GetModuleFileNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
lstrcatA
DeleteFileA
RemoveDirectoryA
GetTempPathA
LoadLibraryA
ReadFile
WriteFile
lstrcmpiA
FreeLibrary
GetFileSize
lstrcmpA
WritePrivateProfileStringA
LoadLibraryExA
SetFileAttributesA
MultiByteToWideChar
GetSystemDirectoryA
MoveFileA
CopyFileA
SetFilePointer
FindFirstFileA
FindClose
CreateProcessA
WaitForSingleObject
GetPrivateProfileSectionNamesA
GetCurrentProcess
LocalFree
GetVersionExA
GlobalAlloc
GlobalFree
GetWindowsDirectoryA
HeapAlloc
GetProcessHeap
ExitProcess
GetDateFormatA
GetTimeFormatA
GetCommandLineA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
lstrcpynA
CreateDirectoryA
lstrlenA
lstrcpyA
CloseHandle
CreateFileA
GetFileAttributesA
HeapFree
IsCharUpperA
LoadStringA
FindWindowA
SendMessageA
wvsprintfA
IsCharAlphaA
IsCharAlphaNumericA
WaitForInputIdle
DispatchMessageA
TranslateMessage
PeekMessageA
CreateWindowExA
RegisterClassA
LoadCursorA
LoadIconA
DefWindowProcA
PostQuitMessage
GetDesktopWindow
CharLowerA
wsprintfA
GetStockObject
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegFlushKey
RegQueryValueExA
RegEnumValueA
OpenProcessToken
DuplicateTokenEx
AllocateAndInitializeSid
GetLengthSid
RegCreateKeyExA
RegDeleteValueA
ShellExecuteA
CoCreateInstance
OleUninitialize
OleInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ