Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
613629055da54ceaa2c11ce1ac25305c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
613629055da54ceaa2c11ce1ac25305c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
613629055da54ceaa2c11ce1ac25305c_JaffaCakes118
Size
875KB
MD5
613629055da54ceaa2c11ce1ac25305c
SHA1
6017077e3547c0bbb326d6b64b1794c444fbb768
SHA256
546864041ac79aec4417821e6101f15c0406aaeca7b11896a8cf4d1d4e4a3dae
SHA512
459940cbe878e502117daf4685a4ba68b1e212b6be1cd7d8f500f3f1be2d168ce82cbf6bf7cac82d79f163723f2a1306d85205dc74b110e233d3a87e69f9adf4
SSDEEP
12288:LaqNGT/eobzmSBvoYk8Rk/cev1z4x+7gi0MA6URidKEnf+vluQpRpiJjZqMUrkmW:mlT/NzmQvRHbusxhXvRc3f+Rux/Pc
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CommConfigDialogA
GetCommState
VirtualFree
SetStdHandle
OpenFileMappingA
GetVersionExA
GetProcessHeaps
TlsFree
GetWindowsDirectoryA
OutputDebugStringA
GetPrivateProfileStructA
SetEvent
GetProfileStringA
WaitNamedPipeA
LoadLibraryA
OpenSemaphoreA
GetProcessAffinityMask
GetModuleFileNameA
SetFileApisToOEM
ReadConsoleA
AddAtomA
QueryPerformanceCounter
FindNextChangeNotification
FillConsoleOutputAttribute
GetLocalTime
CallNamedPipeA
lstrcmpi
ExitProcess
LocalFree
DebugActiveProcess
EnumSystemLocalesA
SetConsoleActiveScreenBuffer
LocalLock
GetExitCodeThread
RequestDeviceWakeup
Module32First
WriteConsoleOutputAttribute
SearchPathA
PeekNamedPipe
GetProcessShutdownParameters
_hread
FlushConsoleInputBuffer
lstrcat
IsValidCodePage
GetTempPathA
MoveFileA
GlobalLock
CreateThread
GlobalCompact
SetTapeParameters
SetCommBreak
GlobalUnlock
lstrcpy
BackupSeek
GlobalFindAtomA
IsBadWritePtr
GetOverlappedResult
MapViewOfFile
GetCPInfoExA
LocalAlloc
StrRChrIA
PathIsRelativeA
PathQuoteSpacesA
SHRegWriteUSValueA
StrCSpnA
SHCreateStreamWrapper
HashData
PathIsUNCA
ColorHLSToRGB
UrlGetLocationA
PathGetDriveNumberA
PathCommonPrefixA
StrSpnA
SHAutoComplete
PathStripToRootA
StrChrIA
AssocQueryStringA
PathRemoveBlanksA
PathIsFileSpecA
StrFormatByteSize64A
PathMakePrettyA
SHDeleteValueA
StrToIntExA
SHRegEnumUSKeyA
SHRegOpenUSKeyA
UrlCombineA
PathFindOnPathA
SHRegCreateUSKeyA
PathAppendA
StrIsIntlEqualA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ