Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
abfea2aa71d6adc7f0e4fa6136810fe3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
abfea2aa71d6adc7f0e4fa6136810fe3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
abfea2aa71d6adc7f0e4fa6136810fe3_JaffaCakes118
Size
484KB
MD5
abfea2aa71d6adc7f0e4fa6136810fe3
SHA1
9bf1dfb2b831614cc3b2cb25b9137e1af7241e8b
SHA256
492e30116f64bee43c7606a53699ddc0baebd88523ab1606d0fdf887e968614b
SHA512
832154ec6f2fb0d9f2f67736279780c1fb496700ebf534677981f47515004d24239b23925df89dd73b9469f5c7a5ef48e1fb621bd416497ce40dea3a234f6a79
SSDEEP
6144:+GWK9s2n1sDEo7SUknwoD6AaeICSj7kEoed0PFn0wccccccccY2BC564ubYe5t:+9ysTOnKt7oUH2k8jk
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
GetSystemInfo
CreateFileMappingA
VirtualQuery
CompareStringA
CreateDirectoryA
GetFileSize
LoadLibraryExA
CompareStringW
GlobalSize
FreeResource
VirtualFree
GetCurrentProcess
HeapDestroy
DuplicateHandle
GetThreadContext
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
SetThreadContext
ResumeThread
GetLastError
MapViewOfFile
DeleteFileA
RemoveDirectoryA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
CreateProcessA
CloseHandle
Sleep
lstrlenA
UnmapViewOfFile
IsBadReadPtr
ReadFile
FindFirstFileA
FindClose
lstrcmpiA
lstrcpynA
WriteFile
GetDriveTypeA
SetFilePointer
GetFileAttributesA
GetPrivateProfileIntA
CreateEventA
QueryPerformanceFrequency
lstrcatA
ReleaseMutex
GetSystemDefaultLangID
CreateMutexA
SetErrorMode
GetSystemDirectoryA
MulDiv
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
FlushFileBuffers
SetStdHandle
LoadLibraryA
FreeLibrary
GetDiskFreeSpaceA
GetTickCount
FindResourceExA
GetWindowsDirectoryA
InterlockedDecrement
LocalFree
InterlockedIncrement
FormatMessageA
GetTempPathA
GetVersionExA
CreateFileA
GlobalFree
FindResourceA
LoadResource
SizeofResource
GlobalAlloc
LockResource
GlobalLock
GlobalUnlock
WaitForSingleObject
SetLastError
ExitProcess
lstrcpyA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
HeapCreate
IsBadCodePtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentVariableA
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetOEMCP
GetACP
GetCPInfo
GetCommandLineA
GetStartupInfoA
RaiseException
HeapAlloc
HeapFree
RtlUnwind
UnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
HeapSize
LCMapStringW
LCMapStringA
IsBadWritePtr
HeapReAlloc
SearchPathA
FindNextFileA
GetTempFileNameA
GetExitCodeProcess
OpenProcess
CompareFileTime
GetProcessTimes
TerminateProcess
GetLocalTime
InitializeCriticalSection
GetCurrentProcessId
GetVersion
LeaveCriticalSection
EnterCriticalSection
GetCurrentThread
VirtualProtect
ResetEvent
SetEvent
QueryPerformanceCounter
SystemTimeToFileTime
lstrcmpA
MoveFileExA
InterlockedExchange
DeleteCriticalSection
VirtualAlloc
WaitForInputIdle
CharUpperA
wsprintfA
MessageBoxA
DialogBoxIndirectParamA
SetDlgItemTextA
SetWindowLongA
SetFocus
BeginPaint
EndPaint
LoadStringA
FillRect
ScreenToClient
SendDlgItemMessageA
GetMessageA
DefWindowProcA
GetParent
GetWindow
SystemParametersInfoA
MsgWaitForMultipleObjects
GetWindowDC
UpdateWindow
InvalidateRect
DrawIcon
MapDialogRect
GetClassNameA
CallWindowProcA
DrawFocusRect
InflateRect
DrawTextA
GetWindowTextA
CopyRect
EnumChildWindows
CreateWindowExA
RegisterClassExA
IntersectRect
GetDlgItemTextA
MapWindowPoints
SetWindowPos
GetPropA
EnableMenuItem
SetPropA
RemovePropA
ShowWindow
IsWindow
GetSysColor
LoadImageA
CreateDialogParamA
GetDC
ReleaseDC
SetActiveWindow
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
CreateDialogIndirectParamA
SetForegroundWindow
GetDesktopWindow
GetClientRect
EnableWindow
IsWindowEnabled
GetWindowLongA
GetWindowRect
MoveWindow
EndDialog
LoadIconA
GetDlgItem
SendMessageA
SetWindowTextA
SetBkMode
SetTextColor
TextOutA
RestoreDC
CreateFontIndirectA
SetBkColor
CreateRectRgn
DeleteObject
CreateSolidBrush
GetDIBColorTable
GetSystemPaletteEntries
CreatePalette
CreateHalftonePalette
GetDeviceCaps
GetObjectA
CreateCompatibleDC
UnrealizeObject
SelectPalette
RealizePalette
SelectObject
BitBlt
DeleteDC
CreateDIBitmap
CreateCompatibleBitmap
CreateDCA
GetStockObject
GetTextExtentPoint32A
CreatePatternBrush
DeleteMetaFile
SetMetaFileBitsEx
SetStretchBltMode
SelectClipRgn
SetPixel
PatBlt
PlayMetaFile
StretchBlt
CreateBitmap
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
SetMapMode
SaveDC
OpenProcessToken
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyA
RegOpenKeyA
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenThreadToken
CoInitializeSecurity
CoInitialize
CoUninitialize
VariantChangeType
VariantClear
SysStringLen
SysReAllocStringLen
SysAllocStringLen
SysAllocString
SysFreeString
GetErrorInfo
LZOpenFileA
LZCopy
LZClose
UuidCreate
RpcStringFreeA
UuidToStringA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
SHGetSpecialFolderLocation
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE