Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
c93e47159c9dcb5fe81774c6987ce5f1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c93e47159c9dcb5fe81774c6987ce5f1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
c93e47159c9dcb5fe81774c6987ce5f1_JaffaCakes118
Size
2.0MB
MD5
c93e47159c9dcb5fe81774c6987ce5f1
SHA1
6f47bb4ab104cf3b27441034acd2b1da46d5ee27
SHA256
16cdf00083b80eba5bf6ac0572e357c68447d0fb88946e0db9392b1c65450506
SHA512
752383d90e76b090567fa12d53c767da5c8f4548cf19a9d1aaaf1367b3d45270d5dd05af3b3d8871bf50fb57b9b860cdae4484fb33655c2e1e575917ed07f478
SSDEEP
49152:cp4bK1RXKLNbTChxKCnFnQXBbrtgb/iQvu0UHOyM:cy+eLN6hxvWbrtUTrUHOD
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ResumeThread
WriteProcessMemory
VirtualProtectEx
GetModuleFileNameW
DuplicateHandle
GetCurrentProcess
SetFileTime
CopyFileW
GetDriveTypeW
GetFileTime
CreateFileW
SetErrorMode
GetTempFileNameW
GetTempPathW
ExitProcess
Sleep
DeleteFileW
CloseHandle
WaitForSingleObject
CreateProcessW
ReadProcessMemory
GetThreadSelectorEntry
GetThreadContext
GetLastError
lstrlenW
GetModuleHandleW
GetStartupInfoW
MessageBoxA
ShellExecuteW
memset
wcscpy
free
_fileno
_chsize
wcsrchr
wcscat
malloc
fclose
fread
fwrite
fseek
_wfopen
sprintf
fflush
_exit
_XcptFilter
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE