Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
724a5287ba00f7d6365d06a3bec083d3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
724a5287ba00f7d6365d06a3bec083d3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
724a5287ba00f7d6365d06a3bec083d3_JaffaCakes118
Size
876KB
MD5
724a5287ba00f7d6365d06a3bec083d3
SHA1
d2739972dcf037b964ee1d1ba3e9a0cc0fb4c2ed
SHA256
73d0a7e28f769c8e14c492bea28035005e731f879f838daa78e5112e7a3282cd
SHA512
1d16386966101adaa7c646ff4c1ad607f758dde324e7838485c71120a070f8de528d219f7fba58b98db24a9bebb950eda0601387b6f343af6e7f62997566b09c
SSDEEP
24576:rjnJkGfBEAl9/PmMdQWRvldgDTNTl6IP3Jvy9bOS:rjnpXlxPddQWbdgDTBkSJvyNOS
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ControlService
SetServiceStatus
CryptContextAddRef
ChangeServiceConfigA
ObjectDeleteAuditAlarmA
CopySid
InitializeAcl
RevertToSelf
CryptSetKeyParam
RegSaveKeyA
IsTextUnicode
CryptEncrypt
OpenEventLogA
RegFlushKey
CryptDestroyHash
RegQueryValueA
DeregisterEventSource
AddAce
RegConnectRegistryA
GetMultipleTrusteeA
RegDeleteValueA
BuildSecurityDescriptorA
CryptHashSessionKey
GetAclInformation
EnumDependentServicesA
AllocateAndInitializeSid
RegOpenKeyA
AccessCheck
FindFirstFreeAce
GetTrusteeTypeA
GetSecurityDescriptorOwner
QueryServiceObjectSecurity
PrivilegeCheck
SetEntriesInAuditListA
BackupEventLogA
CryptGetKeyParam
CryptGenKey
CryptSignHashA
SendIMEMessageExA
IsMenu
GetClassInfoA
EnumClipboardFormats
DefMDIChildProcA
GetIconInfo
MsgWaitForMultipleObjects
SetMenuDefaultItem
SetWindowContextHelpId
GetMenuCheckMarkDimensions
ToUnicodeEx
CharNextExA
DlgDirSelectExA
CheckMenuItem
DrawFrame
CreateIconIndirect
SwitchToThisWindow
SetProcessWindowStation
SetScrollInfo
EnumDisplayMonitors
CascadeWindows
GetKBCodePage
SetClipboardData
TileWindows
TranslateAccelerator
GetLastActivePopup
CreateDialogParamA
SetSysColors
GetAsyncKeyState
GetDC
GetUserObjectSecurity
GetShellWindow
InvalidateRgn
FindWindowExA
LoadIconA
EnableScrollBar
ShowCursor
CreateWindowExA
RegisterWindowMessageA
DdeUnaccessData
GetClipboardFormatNameA
LoadMenuIndirectA
ExcludeUpdateRgn
IMPGetIMEA
DestroyAcceleratorTable
ChangeMenuA
wvsprintfA
GetMenuItemCount
LoadAcceleratorsA
GetComboBoxInfo
VkKeyScanA
InsertMenuItemA
GetExitCodeThread
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ