Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
d3175c9220466c819bb6c4506e1b8c35_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3175c9220466c819bb6c4506e1b8c35_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d3175c9220466c819bb6c4506e1b8c35_JaffaCakes118
Size
241KB
MD5
d3175c9220466c819bb6c4506e1b8c35
SHA1
da2f900525aa5971533e97b0df1e025ae290d77e
SHA256
e7052735feea4ac05750ff42f2224a6b00db6d5efed104a7908d1749e87b3009
SHA512
10e1ab507110c34b2012985d4dc4dd8968d7f5e80edd92e01899d222da5461096bb76d5a4f8c9878011f7f91f9ae3ec75d30b8724a1e65685847ef1cbdddd325
SSDEEP
6144:MY5k6H4EvWcEeBiwfP2MZ4ntqYpi3WVOH0R89F:MY5k6H4CWzCi2PfWtmW8a89F
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MulDiv
RaiseException
SleepEx
MoveFileW
SetCalendarInfoW
GetCurrentDirectoryA
GetHandleInformation
lstrcatW
ConnectNamedPipe
GlobalGetAtomNameW
lstrcmp
CreateMailslotW
QueryPerformanceCounter
FileTimeToDosDateTime
IsBadStringPtrW
LoadLibraryExA
GetWindowsDirectoryW
lstrcmpA
CreateEventA
GetDiskFreeSpaceW
lstrlen
GetUserDefaultLCID
lstrlenA
BeginUpdateResourceW
ExpandEnvironmentStringsA
GetACP
GetDiskFreeSpaceA
GetLastError
DeleteAtom
GetAtomNameA
IsBadWritePtr
Sleep
lstrcpynW
QueryPerformanceFrequency
GetFullPathNameA
GetProcAddress
UpdateLayeredWindow
CopyRect
CharNextA
CreateDesktopA
CreateDialogIndirectParamA
SetWindowTextW
GetMenuStringW
CreateDialogIndirectParamW
FindWindowW
AddFontResourceW
AddFontResourceA
SetMetaFileBitsEx
CreateBitmapIndirect
GetEnhMetaFileA
GetEnhMetaFileW
CreateMetaFileW
CreateCompatibleDC
SelectBrushLocal
CreateMetaFileA
UpdateICMRegKeyA
GetMetaFileA
GetRasterizerCaps
CreateICA
CreatePolyPolygonRgn
DuplicateIcon
StrStrW
AssocQueryStringA
PathIsLFNFileSpecW
StrToIntA
StrPBrkA
PathIsSystemFolderA
MprAdminUserClose
MprAdminUserOpen
_GetFileSecurity_@20
_GetFileAttributesEx_@12
_GetWindowTextLength@4
_LoadImage_@24
_RegQueryValue_@16
_DefMDIChildProc_@16
_NDdeGetTrustedShare_@20
_GetFileTitle@12
_ExtractIconEx_@20
_EnumProps_@8
_GetTempFileName_@16
_ObjectPrivilegeAuditAlarm_@24
_LookupAccountSid_@28
_LookupPrivilegeDisplayName_@20
_FindResourceEx_@16
_WritePrivateProfileSection_@12
_PageSetupDlg_@4
GetNameByTypeA
connect
gethostbyname
MigrateWinsockConfiguration
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ