Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
5b8cc6cf253c360336146db6ef032804_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5b8cc6cf253c360336146db6ef032804_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Target
5b8cc6cf253c360336146db6ef032804_JaffaCakes118
Size
236KB
MD5
5b8cc6cf253c360336146db6ef032804
SHA1
f7d7cea16c09dfa3cb29ca18a76a0730cabbec97
SHA256
c15c0057f8f08880ed3d8f9e17e29422f31f8b30b4ec4c0037fb08a6a4fbbcca
SHA512
2d0d02f88a14f41f23d58afc1e48842fb6782e85ec47c607470963321f3b270da244512dddbe2ea1c19926475aa45be5f9a4fc3305599a11e928a1d0ba075c59
SSDEEP
3072:wJiwY/IuomTXsEmwsh6VNaj2GDj9ldet/pBx+XAHPcAbBANS6hsyIBhc:RzHsEbajbDjlApBx+XAHPbGhsBc
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord700
ord4189
ord913
ord398
ord939
ord5861
ord932
ord5216
ord665
ord6883
ord603
ord1979
ord1969
ord5829
ord273
ord5186
ord354
ord4224
ord940
ord6572
ord4278
ord2652
ord1669
ord1200
ord693
ord539
ord2582
ord4402
ord3370
ord3640
ord6888
ord6907
ord3998
ord3996
ord6675
ord2614
ord4277
ord6282
ord926
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord815
ord561
ord2086
ord6283
ord2725
ord654
ord341
ord5858
ord6662
ord6877
ord6140
ord2818
ord922
ord6143
ord6734
ord3092
ord6199
ord2642
ord6215
ord3811
ord2820
ord6453
ord4160
ord6334
ord536
ord5710
ord1576
ord941
ord924
ord858
ord2915
ord5572
ord5683
ord4129
ord1105
ord356
ord296
ord1168
ord5214
ord2770
ord617
ord668
ord2370
ord860
ord765
ord3698
ord801
ord541
ord535
ord537
ord3803
ord4202
ord2764
ord2302
ord692
ord540
ord567
ord800
ord3639
ord4424
ord3402
ord5290
ord4401
ord1776
ord6055
ord2581
ord4219
ord2024
ord2413
ord6366
ord1771
ord2645
ord4234
ord641
ord324
ord3597
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4710
ord4998
ord4853
ord4376
ord5265
ord823
ord825
ord4673
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
calloc
_setmbcp
printf
_except_handler3
_vsnprintf
sprintf
_mbsnbcat
_mbsrchr
__CxxFrameHandler
_mbsicmp
_mbscmp
memmove
_mbsstr
_snprintf
rand
free
malloc
ftell
fopen
fclose
fseek
fread
fwrite
atol
_ismbcdigit
_mbschr
_mbstok
strrchr
strncpy
strchr
atoi
_memicmp
time
srand
sscanf
WritePrivateProfileStringA
CreateMutexA
LoadLibraryA
FindFirstFileA
DeleteFileA
CreateDirectoryA
FindClose
FreeLibrary
GetModuleFileNameA
CreateFileA
SetFilePointer
GetCurrentProcessId
GetLocalTime
WriteFile
FlushFileBuffers
CloseHandle
OutputDebugStringA
GetVersionExA
lstrlenA
GetProcessHeap
HeapAlloc
GetShortPathNameA
GetModuleHandleA
GetProcAddress
HeapFree
MoveFileA
SetFileTime
SystemTimeToFileTime
SetEndOfFile
FileTimeToSystemTime
lstrcpynA
SetCurrentDirectoryA
GetCurrentDirectoryA
ReleaseMutex
CreateEventA
SetEvent
GetStartupInfoA
MoveFileExA
CopyFileA
RemoveDirectoryA
SetFileAttributesA
GetFileAttributesA
TerminateProcess
OpenProcess
Process32Next
Module32Next
GetLongPathNameA
Module32First
Process32First
CreateToolhelp32Snapshot
FindNextFileA
lstrcmpiA
Sleep
GetSystemDirectoryA
TerminateThread
WaitForSingleObject
GetPrivateProfileStringA
GetTempPathA
lstrcpyA
lstrcatA
GetPrivateProfileIntA
ReadFile
GetFileSize
SetLastError
GetCurrentProcess
CreateProcessA
ResumeThread
SuspendThread
MultiByteToWideChar
GetLastError
GetCommandLineA
GetWindowThreadProcessId
GetClassNameA
EnumWindows
EnableWindow
ExitWindowsEx
IsWindow
SendMessageA
PostMessageA
DispatchMessageA
TranslateMessage
GetMessageA
GetWindowRect
wsprintfA
RegDeleteValueA
RegDeleteKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeleteService
GetFileSecurityA
SetFileSecurityA
RegOpenKeyA
AllocateAndInitializeSid
RegQueryInfoKeyA
RegGetKeySecurity
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
AddAce
GetAce
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
RegSetKeySecurity
FreeSid
RegCreateKeyExA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
CoCreateGuid
CoCreateInstance
CoUninitialize
CoInitialize
VariantClear
SysFreeString
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
HttpQueryInfoA
InternetOpenA
InternetConnectA
InternetAttemptConnect
InternetCloseHandle
InternetReadFile
InternetCrackUrlA
InternetSetOptionA
PathFileExistsA
PathRemoveFileSpecA
PathSkipRootA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE