Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
a84a3d0723e8a44f1fdbf8f55976d2ca_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a84a3d0723e8a44f1fdbf8f55976d2ca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a84a3d0723e8a44f1fdbf8f55976d2ca_JaffaCakes118
Size
5.9MB
MD5
a84a3d0723e8a44f1fdbf8f55976d2ca
SHA1
92054c7c3da89b49105b918c0ddda7f0b30e51ed
SHA256
59d1cfde42b37dc0eba4868e7e1087501781544e2f6cda9b2afcb2f8998ca822
SHA512
a56b73289ed299dd8cd7da0b788e47090bdd031aa17f1d5cb303c3552a052df332986440d57482848bf9493ba5a78dca4edcffd61a518d23a1c9a83150109e4a
SSDEEP
384:VG6paW3UoDROehyad4Qylk1QzYYJLW7wycJbgK:jaW3UoFHFd4QjQztLhbN
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTempPathA
CloseHandle
CreateProcessA
GetModuleFileNameA
GetSystemDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetSystemTime
OpenProcess
GetCurrentProcessId
Process32First
CreateToolhelp32Snapshot
CreateThread
ExitProcess
CopyFileA
Sleep
LoadLibraryA
GetProcAddress
Process32Next
FreeLibrary
GetStartupInfoA
GetModuleHandleA
fwrite
fclose
sprintf
rand
srand
time
fread
fseek
strstr
??2@YAPAXI@Z
_except_handler3
fputs
fgets
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
??3@YAXPAX@Z
fopen
_stricmp
timeGetTime
GetModuleFileNameExA
htons
socket
WSAStartup
connect
send
gethostbyname
inet_addr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ