Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
947264776696ef1e3e9e3fcb5338a264_JaffaCakes118.exe
Resource
win7-20240729-en
Target
947264776696ef1e3e9e3fcb5338a264_JaffaCakes118
Size
468KB
MD5
947264776696ef1e3e9e3fcb5338a264
SHA1
6776ff8dccc1ff0f0919c94d4a64603042b67081
SHA256
84f20adc33892b29cb649ce046f3e9e673de434634c6dd26b551ceb2957879a8
SHA512
08a91435a23b653f1fd89dc1a8043b40f63bdd43759b6567789536db482b1f84d3f0667e259999816083adbb9f928b6a5b6db0ab8c9c1798f4589e42aef7365d
SSDEEP
12288:zLWgL7303z/X/fjYoJpX7qaSv9Ey0RWTxicYGz7u:zCgL7OrX/rYMprm0RWlpL7u
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleW
DeleteFileW
EnumResourceNamesW
LocalFree
lstrlenW
GetModuleFileNameW
GetCurrentProcessId
SetCurrentDirectoryW
GetCommandLineW
ExitProcess
FindResourceW
SizeofResource
WriteFile
CreateFileW
LockResource
LoadResource
GlobalFree
GlobalAlloc
lstrcatW
SetEvent
GetCurrentDirectoryW
CreateEventW
GetExitCodeProcess
GetProcessId
GetCurrentProcess
CreateDirectoryW
GetFileAttributesW
RemoveDirectoryW
FindNextFileW
FindClose
FindFirstFileW
GetLongPathNameW
GetTempFileNameW
GetTempPathW
ReadFile
SetFilePointer
LoadLibraryW
GetProcAddress
FreeLibrary
WaitForSingleObject
CreateThread
OpenFileMappingW
GetLastError
MapViewOfFile
UnmapViewOfFile
GetVersionExW
CloseHandle
GetWindowThreadProcessId
EnumWindows
MoveWindow
LoadStringW
PostMessageW
SetWindowPos
CreateWindowExW
TranslateMessage
DispatchMessageW
GetMessageW
DestroyWindow
UnregisterClassW
DefWindowProcW
SetForegroundWindow
GetSystemMetrics
RegisterClassW
SetLayeredWindowAttributes
RegCloseKey
RegOpenKeyExW
CreateProcessAsUserW
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
DuplicateTokenEx
OpenProcessToken
GetTokenInformation
RegQueryValueExW
CommandLineToArgvW
ShellExecuteExW
SHFileOperationW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ