Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
67c581c98688051b270d7521cfb1bc50_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67c581c98688051b270d7521cfb1bc50_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
67c581c98688051b270d7521cfb1bc50_JaffaCakes118
Size
13.9MB
MD5
67c581c98688051b270d7521cfb1bc50
SHA1
a6f499fd3503bbe1149d3ee8cfb2c7ceeb91caa8
SHA256
84d89f967f453bc4f749226499475417c5359d5012e29c046585109799b8dc96
SHA512
66f1e60fddcdfeb9c01dc6bb76c285d76afc03a7e8a0e24e7209db8e56b405b134231c3a346720cea8709e32158ff51be78a6b0ea5c8c1989c3f8afc1d93140c
SSDEEP
196608:hclTkYr0lZ1ZwnBELOLaZjzjIuko82LnR5XqxsZHrWwo6ufABWcYa815gb8sLC5f:ulTfr0lZDwnuiIPMukrOektBoHgIhHb9
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetMalloc
RegisterClassW
DefWindowProcW
GetWindowWord
SetWindowWord
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorW
ShowWindow
GetLastActivePopup
PostMessageW
EnableWindow
SendMessageW
GetTopWindow
SetWindowLongW
GetWindowLongW
SetForegroundWindow
DialogBoxParamW
SetDlgItemTextW
EndDialog
GetWindowRect
GetSystemMetrics
SetWindowPos
OemToCharA
SetTimer
GetMessageW
PostQuitMessage
KillTimer
LoadIconW
PeekMessageW
TranslateMessage
DispatchMessageW
SetCursor
GetParent
SendDlgItemMessageW
GetDlgItem
InvalidateRect
UpdateWindow
MessageBoxW
SetWindowTextW
GetDlgItemTextW
SetActiveWindow
LoadStringW
LCMapStringW
LCMapStringA
HeapReAlloc
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetEndOfFile
GetConsoleMode
GetConsoleCP
FindClose
FindFirstFileW
SetCurrentDirectoryW
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
GetVolumeInformationW
CreateDirectoryW
DeleteFileW
LoadLibraryA
RemoveDirectoryW
CloseHandle
CreateFileW
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalAlloc
GetModuleFileNameW
GlobalMemoryStatus
GetVersion
GetVersionExW
WriteFile
GetSystemTime
CreateProcessW
LocalFree
FormatMessageW
GetLastError
ExitProcess
MoveFileExW
FindNextFileW
GetTickCount
WaitForSingleObject
SetErrorMode
CreateFileA
ReadFile
SetFilePointer
InitializeCriticalSection
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFileAttributesW
FlushFileBuffers
SetFileTime
Sleep
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
VirtualAlloc
VirtualFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFullPathNameW
GetLocalTime
GetProcAddress
GetWindowsDirectoryW
GetEnvironmentVariableW
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
GetDriveTypeW
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
GetFileType
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
SetTextColor
SetTextAlign
GetBkColor
GetTextExtentPoint32W
ExtTextOutW
CreateDCW
GetDeviceCaps
CreateFontIndirectW
DeleteDC
SelectObject
DeleteObject
SetBkColor
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ