Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
afd4da1f46857fb3438f0164aa9693ba_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afd4da1f46857fb3438f0164aa9693ba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
afd4da1f46857fb3438f0164aa9693ba_JaffaCakes118
Size
255KB
MD5
afd4da1f46857fb3438f0164aa9693ba
SHA1
1b4e66906abdf05eb717ea2803fb8417058d2b70
SHA256
1f57224f7468ec806d1836d6d99fc8664b77fed700c7cfb6fab33c55222b1f0d
SHA512
3e9098892369abc713a80c1f0b9aa809deda99d5013bb91299736d9eecba0ebd926d449a7c8eb59c361304656019bf4f82ec23a7014930c380d40be59d39d31d
SSDEEP
3072:2iG47vmfhnT1unjf9tLEciSWEqF1R/plSaRCKj8Hn7z89NbgjZrTtM8M8Z1yuxZq:2i0J4H+rRZRxjc74DbgjNTiwr+
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcmpi
FatalAppExitW
GetCurrentDirectoryW
SetComputerNameW
GetLogicalDrives
LoadLibraryExA
GlobalFindAtomA
GetLogicalDriveStringsW
GetExitCodeProcess
CreateMailslotW
SetCurrentDirectoryW
lstrcpynA
TlsAlloc
DisconnectNamedPipe
GetShortPathNameA
FatalAppExitA
GetVersion
GetEnvironmentVariableA
GetProcAddress
EnumDateFormatsW
AddAtomW
QueryPerformanceCounter
FileTimeToDosDateTime
SearchPathW
CreateMutexW
GetEnvironmentStringsW
GetEnvironmentStringsA
GetCurrentProcessId
GetDiskFreeSpaceA
LoadCursorA
DialogBoxIndirectParamW
CharLowerA
RemoveMenu
UnregisterClassA
GetMenuState
DestroyIcon
CreateDialogIndirectParamW
AdjustWindowRect
SendDlgItemMessageW
IsIconic
GetCapture
mouse_event
SetDlgItemInt
RegisterClassA
GetMenuItemRect
DefWindowProcW
PeekMessageW
SetTimer
SetCapture
CreateDesktopW
GetActiveWindow
MessageBoxA
GetCapture
CopyIcon
GetSysColor
SetFocus
DialogBoxParamW
DialogBoxIndirectParamA
keybd_event
StretchDIBits
CreateScalableFontResourceA
CreateFontIndirectW
CreateRoundRectRgn
CreateBitmap
GetMetaFileA
CreateFontIndirectExW
CreateFontIndirectExA
GetTextExtentPointA
CryptContextAddRef
StrCmpNA
StrNCmpA
ShellExecuteExA
StrCmpNIA
StrRChrIA
ShellExecuteEx
FreeIconList
StrStrA
VarI8FromBool
VarDateFromUdate
VarEqv
VarUI4FromR8
CreateStdDispatch
CM_Modify_Res_Des_Ex
SetupDiCallClassInstaller
CMP_WaitNoPendingInstallEvents
CM_Open_Class_KeyA
SetupDiGetCustomDevicePropertyA
SetupInstallServicesFromInfSectionA
SetupDiGetClassDevsExA
SetupQueueCopyIndirectA
CM_Reenumerate_DevNode_Ex
MyMalloc
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ