Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
d4bc816e89b36a1b495da42c4344fbe1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d4bc816e89b36a1b495da42c4344fbe1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d4bc816e89b36a1b495da42c4344fbe1_JaffaCakes118
Size
255KB
MD5
d4bc816e89b36a1b495da42c4344fbe1
SHA1
53f7d7005e0ffde0c135bae8cb54088dfbdab232
SHA256
f7a588e48a2ce28a9f9545d0dd285e4ddc317bad7c97f41e03e0ae13d1499e86
SHA512
d23e0210d78a6c2a7094b7c01e26ccbe41bfe3b4232f8c66187b0541fe4ad5511c1118b002ef56f0f7e18b138e95349ce118fea25a1b1817816e519ea3e441eb
SSDEEP
3072:wiG47vmfhnT1unjf9tLEciSWEqF1R/plSaRCKj8Hn7z89NbgjZrTtM8M8Z1yuxZq:wi0J4H+rRZRxjc74DbgjNTiwr+
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcmpi
FatalAppExitW
GetCurrentDirectoryW
SetComputerNameW
GetLogicalDrives
LoadLibraryExA
GlobalFindAtomA
GetLogicalDriveStringsW
GetExitCodeProcess
CreateMailslotW
SetCurrentDirectoryW
lstrcpynA
TlsAlloc
DisconnectNamedPipe
GetShortPathNameA
FatalAppExitA
GetVersion
GetEnvironmentVariableA
GetProcAddress
EnumDateFormatsW
AddAtomW
QueryPerformanceCounter
FileTimeToDosDateTime
SearchPathW
CreateMutexW
GetEnvironmentStringsW
GetEnvironmentStringsA
GetCurrentProcessId
GetDiskFreeSpaceA
LoadCursorA
DialogBoxIndirectParamW
CharLowerA
RemoveMenu
UnregisterClassA
GetMenuState
DestroyIcon
CreateDialogIndirectParamW
AdjustWindowRect
SendDlgItemMessageW
IsIconic
GetCapture
mouse_event
SetDlgItemInt
RegisterClassA
GetMenuItemRect
DefWindowProcW
PeekMessageW
SetTimer
SetCapture
CreateDesktopW
GetActiveWindow
MessageBoxA
GetCapture
CopyIcon
GetSysColor
SetFocus
DialogBoxParamW
DialogBoxIndirectParamA
keybd_event
StretchDIBits
CreateScalableFontResourceA
CreateFontIndirectW
CreateRoundRectRgn
CreateBitmap
GetMetaFileA
CreateFontIndirectExW
CreateFontIndirectExA
GetTextExtentPointA
CryptContextAddRef
StrCmpNA
StrNCmpA
ShellExecuteExA
StrCmpNIA
StrRChrIA
ShellExecuteEx
FreeIconList
StrStrA
VarI8FromBool
VarDateFromUdate
VarEqv
VarUI4FromR8
CreateStdDispatch
CM_Modify_Res_Des_Ex
SetupDiCallClassInstaller
CMP_WaitNoPendingInstallEvents
CM_Open_Class_KeyA
SetupDiGetCustomDevicePropertyA
SetupInstallServicesFromInfSectionA
SetupDiGetClassDevsExA
SetupQueueCopyIndirectA
CM_Reenumerate_DevNode_Ex
MyMalloc
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ