Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
af7e797ce08f7c1d42e9acbabadaabbd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af7e797ce08f7c1d42e9acbabadaabbd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
af7e797ce08f7c1d42e9acbabadaabbd_JaffaCakes118
Size
33KB
MD5
af7e797ce08f7c1d42e9acbabadaabbd
SHA1
99cc28565208972dd76662077e61f748dbdd4691
SHA256
78dede2635a54038817e6a473d0bd0f8963e28eb13c088a13175710f6d45a0c4
SHA512
4bec6249f8acd266141f68de0bda0f3022b7645479d55fd57cc07df95ecc565fa2ebbcae5d8fa195259b5bbc46825a2b34d734094f86184dde90a5a77e772f4f
SSDEEP
768:MK2zrEFnDFN1lLAAbG7F4GWbkyimAbB45DIGMLKK:MXrmnDFN19jbylWbkwAbEDvMeK
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
CloseHandle
WriteFile
SetFilePointer
ReadFile
GetFileSize
CreateFileA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
GetLocaleInfoA
VirtualProtect
GetSystemInfo
LCMapStringA
LCMapStringW
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE