Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
8ef09046025fa1382b642932364d1122_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8ef09046025fa1382b642932364d1122_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
8ef09046025fa1382b642932364d1122_JaffaCakes118
Size
57KB
MD5
8ef09046025fa1382b642932364d1122
SHA1
4a6933cd9313d7c82accfb0291cea037c7c0d774
SHA256
8b0c0098c78074c4a62b079e7a6624b2cac1c34a60d46e7710b1216623db4e31
SHA512
aa1ec6a7dbf013b5b569c5b9867e88e491d2705103e7e5febd14f180e1f2b9fc7e3253d87293238e42615a1341d5b2c7a5da99c8519660ddab4ffa19fc0952d4
SSDEEP
768:sNovjZ8c5TTOZXeSTGXHHb3GGeLVxZewMFKQCdLWQbCW:sNovjZqeSUjF+daECW
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord2614
ord861
ord823
ord860
ord825
ord537
ord535
ord924
ord858
ord2818
ord800
ord540
free
memcmp
isalnum
isspace
wcslen
_wtol
memcpy
atoi
malloc
_strnicmp
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_controlfp
_mbsicmp
__p___argc
__p___argv
_strdup
strtoul
_mbsnbcpy
__CxxFrameHandler
memset
_except_handler3
_itoa
__set_app_type
_stricmp
CreateProcessA
Sleep
GetLastError
lstrlenW
WideCharToMultiByte
lstrcpyA
OutputDebugStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetTempPathA
CopyFileA
GetTempFileNameA
GetStartupInfoA
GetModuleHandleA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrlenA
MultiByteToWideChar
DispatchMessageA
GetMessageA
TranslateMessage
wsprintfA
IsWindow
PostMessageA
EndDialog
PostQuitMessage
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
LoadCursorA
RegisterClassExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
ShellExecuteA
CoInitialize
CoTaskMemAlloc
CreateBindCtx
CoTaskMemFree
SysAllocString
SysFreeString
SysAllocStringLen
RegisterBindStatusCallback
CreateURLMoniker
RevokeBindStatusCallback
??0Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?empty@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE_NXZ
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
??1Init@ios_base@std@@QAE@XZ
InternetCrackUrlA
StrStrIW
PathFindExtensionA
PathFindFileNameA
PathAppendA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ