Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
c8a0234327cc5e4a6fee94dcc6e4a4a2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c8a0234327cc5e4a6fee94dcc6e4a4a2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
c8a0234327cc5e4a6fee94dcc6e4a4a2_JaffaCakes118
Size
125KB
MD5
c8a0234327cc5e4a6fee94dcc6e4a4a2
SHA1
901835775df380587dfcd433ff2ce646752320d1
SHA256
d26c8baac6d8ff77f8abd9825bc1afc42e38d8a6126d967acf5e32a8c4e2cae2
SHA512
f0b0b92e03e20cf2d02cd488cff0bc2de18d1007e230e1336015af728d3bac16e60ab6d3bbe2b09395ef9af2d41c83524dc939811c06ffbe79d78f267ad63a55
SSDEEP
1536:AhiGCQe+q9mJgowS4G+RVAJWwNrblBWc/ksvbfJoZRtqtvRqTZ7nzrNPTJdxKax+:xpHWlbPNrbCc/fJoZRtqtvR0Jz9lzg
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameExW
SetEvent
CreateThread
CreateEventW
GetModuleFileNameW
InterlockedIncrement
lstrlenA
DebugBreak
OutputDebugStringW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
Sleep
GetProcAddress
LoadLibraryW
GetCurrentThreadId
GetCommandLineW
EnterCriticalSection
LeaveCriticalSection
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
lstrcmpiW
GetShortPathNameW
GetVersionExW
GlobalFree
GlobalAlloc
GetCurrentProcess
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
InterlockedDecrement
GetLastError
DeleteCriticalSection
InitializeCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
WaitForSingleObject
CloseHandle
FlushFileBuffers
GetLocaleInfoA
SetHandleCount
GetCommandLineA
SetFilePointer
LoadLibraryA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetVersionExA
HeapAlloc
HeapFree
RtlUnwind
HeapReAlloc
GetProcessHeap
GetStartupInfoW
VirtualFree
VirtualAlloc
HeapDestroy
HeapCreate
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetFileType
CharLowerBuffW
LoadStringW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
PostThreadMessageW
UnregisterClassA
RegCreateKeyW
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
SHGetFolderPathW
ShellExecuteExW
CoRegisterClassObject
StringFromGUID2
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoRevokeClassObject
CoCreateInstance
CoTaskMemFree
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
SysStringLen
PathFileExistsW
StrCmpNIW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ