Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
781ca71a56517d8c7c2411bd06195636_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
781ca71a56517d8c7c2411bd06195636_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
781ca71a56517d8c7c2411bd06195636_JaffaCakes118
Size
876KB
MD5
781ca71a56517d8c7c2411bd06195636
SHA1
cfdc94ff416f57dd5acbd7a82d49da7cde49b017
SHA256
1a5d865c2b10ada10e8e7dd7c007cd852b6d41160222fb7a7956881eb8447d6f
SHA512
c6c770b3ac17d41688d06c31250b8b4eeadf2f62c68ee4e8d4078c60c0d1f11c7a99abc5bf71ad970268e730d4482db4290f4177571fceb2b677b792fe85a574
SSDEEP
24576:gF/SghqYJNFtIKmB3Fj1/CEaqI7Y3hC6h3:gQnK+1j1aRqI8RC6h
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FindResourceA
GetComputerNameA
Heap32ListNext
GetOverlappedResult
ReadConsoleA
SetupComm
GetWindowsDirectoryA
CreateProcessA
FreeConsole
OpenSemaphoreA
GlobalFlags
GetProcessVersion
SetDefaultCommConfigA
WaitCommEvent
TerminateThread
CreateMailslotA
PrepareTape
InitializeCriticalSection
SizeofResource
GetCurrentProcessId
GetUserDefaultLangID
SetSystemTime
lstrcmp
ExitProcess
GetNumberFormatA
AreFileApisANSI
GetStringTypeExA
Beep
BuildCommDCBA
WriteProfileStringA
GetConsoleCursorInfo
GetCommState
GetAtomNameA
IsDBCSLeadByteEx
SetProcessShutdownParameters
DisconnectNamedPipe
GlobalFindAtomA
GetDriveTypeA
EnumDateFormatsA
WriteFile
FindCloseChangeNotification
PurgeComm
FillConsoleOutputAttribute
lstrcpyn
LocalAlloc
GetFullPathNameA
GlobalCompact
GetLocalTime
_lclose
VirtualAlloc
lstrlen
MulDiv
DebugActiveProcess
LocalUnlock
IsBadWritePtr
MapViewOfFile
GlobalReAlloc
ReadConsoleOutputA
GetPrivateProfileIntA
SetFileApisToOEM
RequestDeviceWakeup
SHRegCreateUSKeyA
SHCreateStreamWrapper
AssocQueryStringA
PathFileExistsA
StrFormatByteSize64A
UrlCombineA
PathIsUNCA
ColorHLSToRGB
PathCommonPrefixA
PathFindOnPathA
UrlIsOpaqueA
SHAutoComplete
PathMakePrettyA
StrToIntExA
SHRegWriteUSValueA
PathAppendA
PathQuoteSpacesA
PathSearchAndQualifyA
PathStripToRootA
SHDeleteValueA
StrRChrIA
SHRegEnumUSKeyA
StrCSpnA
StrIsIntlEqualA
SHIsLowMemoryMachine
HashData
UrlGetLocationA
PathRemoveBlanksA
SHRegOpenUSKeyA
InsertMenuItemA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ