Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
76679567adbdd3622a41da16c0ce0b0e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
76679567adbdd3622a41da16c0ce0b0e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
76679567adbdd3622a41da16c0ce0b0e_JaffaCakes118
Size
876KB
MD5
76679567adbdd3622a41da16c0ce0b0e
SHA1
8a1bf20080209964d7981c58b046d4fa5a4ad1c7
SHA256
1e3ef5c789893109a8d5f0f37e140db9e7ac3d977512ca78bc3cce9c3bf4d352
SHA512
a1bb32f86ebc9447527329c4c4c78aca21dc9c979538a9eae2f41343bab17ed7f45c73b1bd486182030c339b5e75e0c49e89a283eb03a30cdcc81660fbd99985
SSDEEP
12288:dKWeLrscHLB+rXw/MxE5g/u8ncbu8haAFXBEUCMGI3jZ485zEe4cSNtY9IxWkt15:dKtLLB/M2gWgcbV0AFRE3Odt554t1
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DebugActiveProcess
GetSystemDirectoryA
SetCommBreak
SetConsoleTextAttribute
ClearCommBreak
UTRegister
GetStringTypeExA
GetCommConfig
FreeConsole
SetConsoleCtrlHandler
CreateProcessA
InterlockedIncrement
MulDiv
Beep
GetConsoleTitleA
GetLogicalDriveStringsA
GetCurrentProcessId
WriteProcessMemory
ResumeThread
lstrcmpi
EnumSystemLocalesA
WriteFile
TlsSetValue
CreateThread
FlushConsoleInputBuffer
IsBadWritePtr
WaitForMultipleObjects
GetFileAttributesExA
SetProcessAffinityMask
ReadConsoleOutputA
GetOverlappedResult
ResetEvent
SetEnvironmentVariableA
DuplicateHandle
IsBadReadPtr
TlsFree
SetStdHandle
WaitNamedPipeA
lstrcpyn
Thread32Next
GetLongPathNameA
WritePrivateProfileStringA
GetSystemPowerStatus
CommConfigDialogA
SetConsoleActiveScreenBuffer
ReadFileEx
QueueUserAPC
IsDBCSLeadByteEx
GetExitCodeThread
GetNumberFormatA
VirtualQueryEx
GetPrivateProfileStructA
SleepEx
LoadModule
_hread
InitializeCriticalSection
VirtualFree
InterlockedCompareExchange
Heap32ListNext
CompareStringA
SizeofResource
StrChrIA
StrCSpnA
StrIsIntlEqualA
PathIsFileSpecA
UrlCombineA
SHAutoComplete
PathStripToRootA
StrFormatByteSize64A
StrSpnA
SHRegOpenUSKeyA
SHRegWriteUSValueA
UrlGetLocationA
PathGetDriveNumberA
PathIsUNCA
SHCreateStreamWrapper
PathFindOnPathA
PathAppendA
PathQuoteSpacesA
SHDeleteValueA
StrToIntExA
PathRemoveBlanksA
SHRegCreateUSKeyA
SHRegEnumUSKeyA
PathSearchAndQualifyA
PathMakePrettyA
PathFileExistsA
UrlIsOpaqueA
SHIsLowMemoryMachine
AssocQueryStringA
CopySid
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ