Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
490025f8f117e537acd44117bb8ddcb8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
490025f8f117e537acd44117bb8ddcb8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
490025f8f117e537acd44117bb8ddcb8_JaffaCakes118
Size
525KB
MD5
490025f8f117e537acd44117bb8ddcb8
SHA1
d7dfeec9eed6bf37459641ae12d9fb5a606f9a0c
SHA256
fc87e29ca6e6e9b3821bbddd4215dd0c32ba174edfc257056fa120f9d6f52595
SHA512
c4a1d82928e80e5ed36df5d9951b53461d793c15d8b762d0f7495cb4cc51ceb636fd9965947dd41760760b4b47aad86bffda1791ae6d9cf9660eca76accb60cc
SSDEEP
12288:2nB00dfhypZa9AAL6SXkJeE1Iiav9wYN0AR9CBUpuWy:2ed4JL6mxd9dN0AR9iUpuWy
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCommandLineA
GetCurrentProcess
SetPriorityClass
GetTickCount
FormatMessageA
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteFileA
GetWindowsDirectoryA
GetCurrentThreadId
WriteFile
SetFilePointer
GetFileSize
CreateFileA
GetCurrentProcessId
GetLocalTime
WaitForSingleObject
SetEvent
ResetEvent
CreateEventA
OpenEventA
SetThreadPriority
GetModuleFileNameA
SetLastError
GetVersionExA
GetExitCodeProcess
CreateProcessA
ReleaseMutex
CreateMutexA
lstrcpynA
lstrcatA
lstrcpyA
InterlockedIncrement
InterlockedDecrement
TerminateThread
RaiseException
RtlUnwind
ExitProcess
GetStartupInfoA
ExitThread
TlsSetValue
TlsGetValue
CreateThread
HeapAlloc
HeapFree
GetCPInfo
HeapReAlloc
LCMapStringA
LCMapStringW
GetTimeFormatA
GetDateFormatA
CompareStringA
CompareStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
TlsFree
TlsAlloc
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
HeapSize
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
GetACP
GetOEMCP
FlushFileBuffers
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
IsBadWritePtr
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadReadPtr
IsBadCodePtr
GetTimeZoneInformation
SetStdHandle
ReadFile
GetLocaleInfoW
SetEndOfFile
SetEnvironmentVariableA
CloseHandle
GetSystemDirectoryA
GetComputerNameA
Sleep
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetLastError
GetLocaleInfoA
FreeLibrary
FindWindowA
SendMessageA
DeleteMonitorA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegEnumKeyExA
RegSetValueExA
RegCreateKeyExA
RegEnumValueA
FreeSid
AllocateAndInitializeSid
GetAce
SetKernelObjectSecurity
GetSecurityDescriptorDacl
SetSecurityInfo
InitializeAcl
AddAccessAllowedAce
ControlService
CloseServiceHandle
OpenServiceA
OpenSCManagerA
StartServiceA
IsValidSid
GetLengthSid
CoReleaseServerProcess
CoAddRefServerProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ