Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
cef1752adaed2e11d028138b3dcd466f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cef1752adaed2e11d028138b3dcd466f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
cef1752adaed2e11d028138b3dcd466f_JaffaCakes118
Size
140KB
MD5
cef1752adaed2e11d028138b3dcd466f
SHA1
96a61e6a8ee341c51d268fd57d84a6b9adcd023e
SHA256
c012dfafd6004f8af868e143d539562830140198224e3409b7d2ca8402a6a583
SHA512
5f5a924124a807d8266babc03795edd40c0a1b0adc4593f2b4a079aaa5c360ae35301f2f92095993e6d4ac233b437af296e03a013e903dfb72576121d5061cc3
SSDEEP
3072:XXQWvsu60u98C4v0aqhsV/+xU1PlpFrjPnvQvE1PlpFrjPnvO9vC01r:XXnW0u5ON4sdOq01r
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HttpAddRequestHeadersA
InternetCrackUrlA
InternetOpenA
InternetSetOptionA
InternetConnectA
HttpOpenRequestA
InternetGetCookieA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
GetAdaptersInfo
ImageList_Create
ImageList_Draw
ImageList_DrawEx
InitCommonControlsEx
ImageList_SetBkColor
ImageList_AddMasked
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
GetLastError
CloseHandle
CreateFileA
ReadFile
MapViewOfFileEx
CreateFileMappingA
GetFileSize
UnmapViewOfFile
lstrcmpiA
GetStringTypeExA
WideCharToMultiByte
lstrlenA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
GetSystemTime
GetPrivateProfileIntA
VirtualFree
FlushFileBuffers
WriteFile
CompareStringA
VirtualAlloc
SetFilePointer
InterlockedExchange
WaitForSingleObject
SetLastError
GetTickCount
CreateThread
lstrcmpA
DeleteFileA
DeleteCriticalSection
SetEvent
CreateEventA
InitializeCriticalSection
WaitForMultipleObjects
ResetEvent
LeaveCriticalSection
EnterCriticalSection
ExitProcess
GetVolumeInformationA
GetModuleFileNameA
CreateDirectoryA
GetTempPathA
WritePrivateProfileStringA
CreateMutexA
SetErrorMode
SetUnhandledExceptionFilter
LoadLibraryA
GetProcessHeap
GetModuleHandleA
TerminateThread
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrcatA
lstrcpyA
VirtualQuery
RtlUnwind
Sleep
GetWindowLongA
KillTimer
SetTimer
RegisterWindowMessageA
GetClientRect
DrawTextA
SetWindowLongA
SetWindowTextA
GetSysColor
CallWindowProcA
DestroyIcon
LoadIconA
DialogBoxParamA
GetDlgItem
GetWindowRect
GetWindowDC
LoadBitmapA
SetForegroundWindow
EndDialog
SetDlgItemTextA
ShowWindow
GetDlgItemTextA
GetWindowTextA
SendDlgItemMessageA
GetCursorPos
DefWindowProcA
PtInRect
LoadCursorA
SetCursor
LoadStringA
InvalidateRect
SetWindowRgn
wsprintfA
SendMessageA
wvsprintfA
CharNextA
MessageBoxA
CharLowerA
SetBkMode
CreateFontIndirectA
SelectObject
SetTextColor
CreateRectRgn
CombineRgn
GetDIBits
DeleteObject
RegQueryValueExA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
SHGetSpecialFolderPathA
ShellExecuteExA
Shell_NotifyIconA
SHGetFolderPathA
ShellExecuteA
PathCombineA
StrToIntA
PathAppendA
PathRemoveFileSpecA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ