Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
8acd445d71c61e77c1f6ad6e82451c86_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8acd445d71c61e77c1f6ad6e82451c86_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
8acd445d71c61e77c1f6ad6e82451c86_JaffaCakes118
Size
876KB
MD5
8acd445d71c61e77c1f6ad6e82451c86
SHA1
ba72ef2dd7133d74e0ab8cd1472a70c93429bca4
SHA256
a6741d4ba9aded27a1719a0f5ba1c6eb6199ac351ca610ac27b9a604680fa42d
SHA512
93c10efd8adaf0721951fcb3ff4208b629581ac93f47e0bbc8489925fc668a0c4c02be1c556df42094fe51062ad42477a13eabff2e3074a55e178e28580e72f9
SSDEEP
24576:V/DW93tPgyPrgN8iLktj2YXJmVZ+z160ce/UrzotmWZX:VOp77j2h+z0beO+mW9
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHRegOpenUSKeyA
PathRemoveBlanksA
SHRegEnumUSKeyA
StrSpnA
StrRChrIA
SHRegWriteUSValueA
HashData
PathIsRelativeA
PathIsFileSpecA
StrCSpnA
StrChrIA
PathStripToRootA
PathMakePrettyA
AssocQueryStringA
PathCommonPrefixA
PathSearchAndQualifyA
PathFileExistsA
StrToIntExA
UrlCombineA
UrlGetLocationA
PathGetDriveNumberA
UrlIsOpaqueA
PathQuoteSpacesA
PathFindOnPathA
ColorHLSToRGB
StrIsIntlEqualA
SHAutoComplete
StrFormatByteSize64A
PathAppendA
SHIsLowMemoryMachine
SHDeleteValueA
SHCreateStreamWrapper
MapViewOfFile
SetConsoleActiveScreenBuffer
lstrcmp
CopyFileA
SetLocalTime
EnumResourceLanguagesA
CreateProcessA
GetShortPathNameA
ReadConsoleA
CreateFiber
GlobalAddAtomA
GetPrivateProfileIntA
GetProcessShutdownParameters
GetSystemPowerStatus
CreateNamedPipeA
SetEvent
ContinueDebugEvent
InterlockedCompareExchange
SetSystemTime
VirtualAlloc
GetComputerNameA
ReadProcessMemory
CreateConsoleScreenBuffer
GetPrivateProfileSectionNamesA
CallNamedPipeA
UTRegister
GetFullPathNameA
CancelIo
GetProcessHeaps
WaitCommEvent
FindResourceA
SizeofResource
VirtualQueryEx
IsValidCodePage
SetFileApisToOEM
DuplicateHandle
GlobalReAlloc
LocalUnlock
GetTapeParameters
EnumResourceTypesA
BuildCommDCBA
GetTempPathA
GetLongPathNameA
FindNextChangeNotification
PeekNamedPipe
Thread32Next
GetVersionExA
GlobalFlags
HeapCompact
GetTickCount
GetLogicalDriveStringsA
WaitForMultipleObjects
WriteProfileStringA
_lread
IsDBCSLeadByteEx
QueueUserAPC
DeleteFileA
OpenFileMappingA
CryptEncrypt
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ