Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
aeb2bcece6de3a2cc38f8093ee7a72fc_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aeb2bcece6de3a2cc38f8093ee7a72fc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
aeb2bcece6de3a2cc38f8093ee7a72fc_JaffaCakes118
Size
875KB
MD5
aeb2bcece6de3a2cc38f8093ee7a72fc
SHA1
2b1a9b15ce089c35558dd44401cc42d972d985a4
SHA256
fbca5b64b4ca031a8d54a3f49e57aced2045f611441ab0c3fc6a4cd563953151
SHA512
c0d8001d9f49d780b678f41ec94740fe8f13ad9c4818f3abcd9e9cf0841de00c2114854f37735e8a30181795bca213ef3f11e883bb7c95051eb7d29a0c3920a1
SSDEEP
24576:eUd7YD+Odq26IWPJhzJIOO83dnaR64ag:ezSOg269XVIOR5aRS
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcessShutdownParameters
GetLocalTime
SetConsoleWindowInfo
PeekNamedPipe
DeleteAtom
LocalAlloc
GetLogicalDriveStringsA
TlsFree
IsBadHugeReadPtr
UpdateResourceA
GlobalLock
HeapWalk
SetConsoleActiveScreenBuffer
ReleaseSemaphore
GetUserDefaultLangID
TransactNamedPipe
OpenSemaphoreA
FlushConsoleInputBuffer
FindFirstFileA
WriteFileGather
ClearCommBreak
AreFileApisANSI
LocalFree
DeleteFileA
IsValidCodePage
Heap32First
OutputDebugStringA
LocalFileTimeToFileTime
GetFullPathNameA
BackupSeek
WaitCommEvent
QueueUserAPC
ContinueDebugEvent
CallNamedPipeA
OpenEventA
GetConsoleOutputCP
GetProcessVersion
SetConsoleTextAttribute
ExpandEnvironmentStringsA
PrepareTape
GetWindowsDirectoryA
FatalExit
_lread
GetDiskFreeSpaceA
GetConsoleCursorInfo
HeapDestroy
Thread32Next
VirtualAlloc
LockFileEx
BuildCommDCBA
SetMailslotInfo
SetCommTimeouts
GetStringTypeExA
lstrcmpi
GetCommState
RequestDeviceWakeup
GlobalAddAtomA
CreateThread
LocalLock
PathIsUNCA
PathMakePrettyA
StrChrIA
SHAutoComplete
StrIsIntlEqualA
UrlGetLocationA
AssocQueryStringA
PathFileExistsA
SHRegOpenUSKeyA
StrToIntExA
UrlCombineA
SHDeleteValueA
UrlIsOpaqueA
SHIsLowMemoryMachine
PathSearchAndQualifyA
SHCreateStreamWrapper
HashData
PathIsRelativeA
PathIsFileSpecA
PathStripToRootA
StrRChrIA
PathCommonPrefixA
PathRemoveBlanksA
SHRegCreateUSKeyA
StrSpnA
ColorHLSToRGB
StrCSpnA
PathFindOnPathA
SHRegEnumUSKeyA
SHRegWriteUSValueA
PathAppendA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ