Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
681dd07c1850e1855b673cbb064b024c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
681dd07c1850e1855b673cbb064b024c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
681dd07c1850e1855b673cbb064b024c_JaffaCakes118
Size
97KB
MD5
681dd07c1850e1855b673cbb064b024c
SHA1
47f432fb6cba8fb2f27d76251c59208a70487975
SHA256
866f46bdab229c7f314baa8e34ba7d3d5faa5444d5b0c6c519218bc8646ea510
SHA512
8473113b426fd668453da0c4ad626be7948efd9cf56ad62b8a709810a769d7c68a287641b2ce5418248596b20ffbbb33620f99b33c6c5866f03f5c7d60495be2
SSDEEP
1536:qbX3jH/3zAvpF5fMg9Hyav2Qb6ms1FDZBOVpG27aQC:y3Sf5v2y6HVZBOzb+
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
g:\Acro_root_nsp\BuildResults\bin\release\Eula.pdb
GetLastError
CopyFileW
GetPrivateProfileStringW
MultiByteToWideChar
lstrlenA
SetLastError
LockResource
LoadResource
GetModuleFileNameW
lstrcmpW
MulDiv
GlobalUnlock
GlobalLock
GlobalFree
GlobalHandle
GetPrivateProfileIntW
lstrcpynW
GetFullPathNameW
LoadLibraryA
GetProcAddress
InterlockedDecrement
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
VirtualFree
VirtualAlloc
Sleep
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
InterlockedIncrement
GetCurrentThreadId
GlobalAlloc
GetCurrentProcess
FlushInstructionCache
lstrcpyW
GetSystemTimeAsFileTime
lstrlenW
lstrcatW
FindFirstFileW
FindClose
FindResourceW
RaiseException
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
IsProcessorFeaturePresent
GetDlgItem
SetWindowContextHelpId
SendMessageW
MapDialogRect
EndDialog
DestroyWindow
CreateWindowExW
GetWindowTextW
GetSysColor
MoveWindow
GetClientRect
ClientToScreen
ScreenToClient
GetDC
ReleaseDC
InvalidateRect
InvalidateRgn
RedrawWindow
UnregisterClassA
SetCapture
IsChild
GetParent
GetClassNameW
CharNextW
ReleaseCapture
FillRect
CallWindowProcW
EndPaint
BeginPaint
GetDesktopWindow
GetActiveWindow
DialogBoxIndirectParamW
RegisterWindowMessageW
GetWindowTextLengthW
CreateAcceleratorTableW
RegisterClassExW
LoadCursorW
GetClassInfoExW
DestroyAcceleratorTable
IsWindow
SetFocus
GetWindow
SetDlgItemTextW
SendDlgItemMessageW
GetDlgItemTextW
EnableWindow
IsWindowEnabled
SetWindowPos
SetWindowTextW
DefWindowProcW
GetWindowLongW
SetWindowLongW
GetFocus
CreateSolidBrush
BitBlt
GetStockObject
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
GetObjectW
CreateCompatibleDC
GetDeviceCaps
GetSaveFileNameW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
OleInitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
CLSIDFromString
OleUninitialize
CoGetClassObject
OleLockRunning
StringFromGUID2
CoCreateInstance
CLSIDFromProgID
SysAllocString
VariantInit
VariantClear
DispCallFunc
LoadRegTypeLi
LoadTypeLi
SysStringByteLen
OleCreateFontIndirect
SysAllocStringLen
SysStringLen
SysFreeString
_controlfp_s
_invoke_watson
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
_except_handler4_common
?terminate@@YAXXZ
_wtoi64
malloc
swprintf_s
??2@YAPAXI@Z
calloc
??_U@YAPAXI@Z
_recalloc
__CxxFrameHandler3
memset
wcscspn
wcsncpy_s
memcpy_s
_CxxThrowException
free
??_V@YAXPAX@Z
??3@YAXPAX@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE