Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
be2618df33883f16eb2ce03597388228_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be2618df33883f16eb2ce03597388228_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
be2618df33883f16eb2ce03597388228_JaffaCakes118
Size
350KB
MD5
be2618df33883f16eb2ce03597388228
SHA1
02b164466caaedba130977895e33379e5c631552
SHA256
f6d9a605a33e87537d6873ac2f4019cd735d8e95ead479ab56e7c26cb213cd81
SHA512
a4f570e4853ce1a4766b7270059330375a096a11e73f9a2fb63948769f26c8599aaf83004d5f0ac4c6d0a302e2037f7f183a49b0a138478bbeb660b0e96fd08c
SSDEEP
6144:LRwQ298qHyHWrCggl1PhmAl5hxQ9xjYqMk6:9v296BXldll5hCUq6
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
mxcrsc32.pdb
FindFirstFileA
FindNextFileA
FindClose
RemoveDirectoryA
CreateDirectoryA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetCurrentProcess
SetFileAttributesA
GetTickCount
GetComputerNameW
CompareStringW
CreateFileW
WriteConsoleW
SetStdHandle
DeleteCriticalSection
GetComputerNameA
LoadLibraryW
HeapReAlloc
RtlUnwind
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
GetStdHandle
ExitProcess
HeapSize
GetStringTypeW
IsProcessorFeaturePresent
LCMapStringW
SetLastError
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetCPInfo
RaiseException
GetStartupInfoW
HeapSetInformation
SetEnvironmentVariableA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InitializeCriticalSection
HeapCreate
HeapFree
HeapAlloc
MultiByteToWideChar
DeviceIoControl
GetVersionExA
GetACP
GetDriveTypeA
FlushFileBuffers
SetEndOfFile
Sleep
CreateFileA
TerminateProcess
GetVersion
GetTimeZoneInformation
GetCurrentProcessId
MoveFileA
DeleteFileA
SetFileTime
GetFileTime
GetSystemDirectoryA
WriteFile
ReadFile
SetFilePointer
GetFileSize
CloseHandle
WaitForSingleObject
CreateSemaphoreA
FreeLibrary
GetLastError
GetProcAddress
LeaveCriticalSection
LoadLibraryA
EnterCriticalSection
HeapDestroy
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
OutputDebugStringA
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
LoadStringA
LoadIconA
LoadCursorA
wsprintfA
MapVirtualKeyExA
MapVirtualKeyA
GetKeyboardLayout
EnumDisplaySettingsA
wsprintfW
GetKeyNameTextA
GetForegroundWindow
DefWindowProcA
PostQuitMessage
DestroyWindow
DispatchMessageA
TranslateMessage
PeekMessageA
MsgWaitForMultipleObjects
CreateWindowExA
RegisterClassA
GetStockObject
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
GetUserNameA
RegDeleteKeyA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
CoUninitialize
CoCreateInstance
CoInitialize
VariantClear
VariantInit
SysFreeString
SysAllocString
SysAllocStringLen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ