Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
5c987d59de26d285da0c4d0c34ae621d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5c987d59de26d285da0c4d0c34ae621d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
5c987d59de26d285da0c4d0c34ae621d_JaffaCakes118
Size
200KB
MD5
5c987d59de26d285da0c4d0c34ae621d
SHA1
4ab858534895ff9e9b643660d281d3c207470888
SHA256
5f1b47d1c4d40a58438bec8f7ea83c14102655338f868b4c785252cf8a1a6681
SHA512
f18efd460ab49a95c94c281232e53160fb5facf768ea82232ac7ebf1a26c5e9102d4d24b65eba69ddfaefd86878526e7fa77fac06923f924e42d8240e13a432b
SSDEEP
1536:3J4ENvyTwA0Tvg4U74gbpMKVcdvVOdzO5UowSBKDx/6Ea2RiNRe1td3A4NutObKC:3JXByEA0Xobpj+R0tC2R0etdputwK
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadSTRING
LoadBITMAP
LoadIMAGE
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
lstrlenA
lstrcmpiA
GetModuleFileNameA
IsDBCSLeadByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
CreateMutexA
GetCurrentThreadId
GetCommandLineA
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetModuleHandleA
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
Sleep
GetStdHandle
WriteFile
HeapCreate
HeapDestroy
VirtualFree
ExitProcess
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetOEMCP
InterlockedDecrement
CreateEventA
GetLastError
CloseHandle
GetVersionExA
LoadLibraryA
FreeLibrary
GetCurrentProcessId
GetProcAddress
SetFilePointer
GetConsoleCP
GetTickCount
GetCPInfo
GetStartupInfoA
GetProcessHeap
HeapReAlloc
FlushFileBuffers
CreateFileA
VirtualQuery
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
LocalFree
TerminateProcess
SetTimer
GetDC
GetSystemMetrics
ReleaseDC
PostQuitMessage
KillTimer
CreatePopupMenu
AppendMenuA
DestroyWindow
TrackPopupMenu
DestroyIcon
RegisterClassA
CreateWindowExA
RegisterWindowMessageA
GetMessageA
DispatchMessageA
DefWindowProcA
DestroyMenu
FindWindowA
SetWindowLongA
PostThreadMessageA
CharNextA
GetCursorPos
GetWindowLongA
PostMessageA
UnregisterClassA
SetForegroundWindow
GetDIBits
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetBkColor
BitBlt
SetTextColor
DeleteDC
DeleteObject
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
Shell_NotifyIconA
CoCreateInstance
CoSuspendClassObjects
StringFromGUID2
CoRevokeClassObject
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CoInitialize
CLSIDFromProgID
CoTaskMemFree
CoRegisterClassObject
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysFreeString
SysStringByteLen
SysAllocStringByteLen
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE