Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
c79b43d78d90cc9195d516a3df0f8388_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c79b43d78d90cc9195d516a3df0f8388_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
c79b43d78d90cc9195d516a3df0f8388_JaffaCakes118
Size
8.7MB
MD5
c79b43d78d90cc9195d516a3df0f8388
SHA1
2e45273838b371e93f7128cd9678e0ad16b71dbd
SHA256
e8e3d69bfcc336317576c873d572938a2701b221742fafa1541774841cc4aee7
SHA512
1c583a544fda7a2f210d0e2b1503a7d97fcb6594c3a4595a42890c875338ffdff5dd3f2a82b54078feb94eb37384a319f58a254d1726e43baf193b601a31e285
SSDEEP
196608:sb8hEZJTH/QIOoPNGtCPJpBRItnvrk6qm6fZfmuw9Da6O:2EEZJTIIOYNECtKjMddgD1O
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteW
FindExecutableW
SHBrowseForFolderW
SHGetMalloc
DefWindowProcW
GetWindowWord
SetWindowWord
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorW
GetLastActivePopup
KillTimer
ShowWindow
PostMessageW
SendMessageW
EnableWindow
SetTimer
SetForegroundWindow
RegisterClassW
DialogBoxParamW
SetDlgItemTextW
EndDialog
GetWindowRect
GetSystemMetrics
SetWindowPos
OemToCharA
GetWindowLongW
SetWindowLongW
GetKeyState
PeekMessageW
TranslateMessage
DispatchMessageW
SetCursor
GetParent
SendDlgItemMessageW
GetDlgItem
InvalidateRect
UpdateWindow
MessageBoxW
SetWindowTextW
GetDlgItemTextW
SetActiveWindow
LoadStringW
LCMapStringW
LCMapStringA
HeapReAlloc
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetEndOfFile
GetConsoleMode
FindFirstFileW
SetCurrentDirectoryW
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
LoadLibraryA
CreateDirectoryW
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalAlloc
GlobalMemoryStatus
GetVersion
GetVersionExW
GetModuleFileNameW
WriteFile
GetSystemTime
CreateProcessW
LocalFree
CloseHandle
CreateFileW
ExitProcess
FormatMessageW
GetLastError
SetErrorMode
CreateFileA
ReadFile
SetFilePointer
InitializeCriticalSection
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetVolumeInformationW
FlushFileBuffers
FindClose
GetConsoleCP
Sleep
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
GetSystemTimeAsFileTime
GetCurrentProcessId
VirtualAlloc
VirtualFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFullPathNameW
GetLocalTime
GetProcAddress
GetWindowsDirectoryW
GetCurrentDirectoryW
GetEnvironmentVariableW
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
GetDriveTypeW
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
GetFileType
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetTickCount
SetTextColor
SetTextAlign
GetBkColor
GetTextExtentPoint32W
ExtTextOutW
CreateDCW
GetDeviceCaps
CreateFontIndirectW
DeleteDC
SelectObject
DeleteObject
SetBkColor
ord17
RegQueryValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ