Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
b14e9c8d27d0e34a6039c8fca5b89822_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b14e9c8d27d0e34a6039c8fca5b89822_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b14e9c8d27d0e34a6039c8fca5b89822_JaffaCakes118
Size
876KB
MD5
b14e9c8d27d0e34a6039c8fca5b89822
SHA1
07c0f3a1ea80a23ae98243eb9974ce66596bdec8
SHA256
463d9345ca27f8ac5a404a5279818b604bc5ecd819b72f5005bff8da1bf91616
SHA512
80f651aac6b20df5a7455f05d71176e78945aa75a56452e9bd1ae5110ab17e374d99a3b3135584b7fcd0cc3f919da4be8e75bc764f1a2f84d283bb2769ce7c38
SSDEEP
24576:Bsd4JCrbC/ngV4dXJZ69TsZyiE06OMIrEHo4:4pYgVKZqBiEe/h4
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
QueueUserAPC
GetCommState
WriteProcessMemory
ReadConsoleA
GlobalFindAtomA
OpenEventA
GetDriveTypeA
lstrcpyn
TransactNamedPipe
SystemTimeToTzSpecificLocalTime
IsBadReadPtr
IsBadWritePtr
MulDiv
LocalAlloc
CloseHandle
OpenProcess
GetOverlappedResult
CallNamedPipeA
GetBinaryTypeA
LoadModule
LocalShrink
lstrcat
CopyFileA
GlobalCompact
GetConsoleOutputCP
GetTapeParameters
FatalExit
SetEvent
ReleaseSemaphore
HeapUnlock
SetTapeParameters
LocalFileTimeToFileTime
GlobalReAlloc
GetConsoleTitleA
GetProfileIntA
RequestDeviceWakeup
GetDiskFreeSpaceA
CommConfigDialogA
GenerateConsoleCtrlEvent
GetPrivateProfileIntA
IsProcessorFeaturePresent
_lclose
VirtualFree
GetFileTime
OutputDebugStringA
BuildCommDCBA
DisconnectNamedPipe
SetVolumeLabelA
GetSystemTimeAdjustment
SetConsoleCursorPosition
CancelIo
LockFileEx
InterlockedExchange
Process32Next
SetCommBreak
GetNumberFormatA
TlsSetValue
GetCPInfoExA
GlobalGetAtomNameA
Thread32Next
VirtualLock
StrChrIA
PathSearchAndQualifyA
PathFileExistsA
PathAppendA
PathIsFileSpecA
SHRegCreateUSKeyA
PathQuoteSpacesA
PathStripToRootA
StrToIntExA
SHIsLowMemoryMachine
StrCSpnA
SHAutoComplete
StrIsIntlEqualA
PathIsUNCA
PathIsRelativeA
SHRegOpenUSKeyA
HashData
StrFormatByteSize64A
AssocQueryStringA
PathRemoveBlanksA
SHCreateStreamWrapper
SHRegWriteUSValueA
UrlCombineA
PathGetDriveNumberA
StrRChrIA
PathFindOnPathA
UrlIsOpaqueA
PathCommonPrefixA
SHRegEnumUSKeyA
AllocateAndInitializeSid
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ