Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
d73b84035246fda138e8b272eae3b5eb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d73b84035246fda138e8b272eae3b5eb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d73b84035246fda138e8b272eae3b5eb_JaffaCakes118
Size
876KB
MD5
d73b84035246fda138e8b272eae3b5eb
SHA1
7afcd4f752e8523d580a27a54e28d67bc0294449
SHA256
43b04ce9c075b5a93067588b5e394cfb508deb211100345f3c0cbf10c6f0e0ba
SHA512
d70f262736d6b5f2491ac682e8faf010f3e9a91a2330e2c27237aab61c6db82be76b779087dde367ef786e9c9c29f57507a3c9ca73a8ea3ebaa8784d7aec6996
SSDEEP
24576:8dw+vm2FnLZirvvA8l91kxaFqufQaaAv7EWBny9Y:8vxrirv/l91kgFmaacJ7
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PathAppendA
PathIsUNCA
PathFileExistsA
StrFormatByteSize64A
StrChrIA
SHAutoComplete
StrSpnA
PathQuoteSpacesA
UrlIsOpaqueA
StrIsIntlEqualA
SHRegCreateUSKeyA
PathCommonPrefixA
StrCSpnA
SHIsLowMemoryMachine
StrRChrIA
PathStripToRootA
StrToIntExA
ColorHLSToRGB
PathSearchAndQualifyA
UrlGetLocationA
SHDeleteValueA
PathGetDriveNumberA
PathFindOnPathA
PathMakePrettyA
AssocQueryStringA
PathIsRelativeA
SHRegOpenUSKeyA
UrlCombineA
lstrcmp
GetCPInfoExA
SetConsoleWindowInfo
SetCommMask
SetProcessShutdownParameters
SetConsoleTextAttribute
_hread
GetProfileIntA
WriteConsoleOutputAttribute
TlsSetValue
GetTempPathA
ExpandEnvironmentStringsA
GetStringTypeExA
SetConsoleCtrlHandler
lstrcmpi
SetMailslotInfo
WritePrivateProfileStringA
FindAtomA
SetCommTimeouts
GetPrivateProfileIntA
OpenSemaphoreA
InterlockedExchange
IsBadReadPtr
GetConsoleOutputCP
GetCurrentProcessId
SetDefaultCommConfigA
InterlockedCompareExchange
VirtualLock
Heap32ListNext
EnumResourceTypesA
FlushConsoleInputBuffer
CreateConsoleScreenBuffer
GetSystemTimeAdjustment
IsBadWritePtr
_llseek
SetSystemTime
WaitForSingleObject
GetNumberFormatA
FoldStringA
WriteConsoleInputA
GetShortPathNameA
LoadModule
EnumResourceLanguagesA
VirtualAlloc
SetEnvironmentVariableA
ResetEvent
_lread
CopyFileA
LocalFree
ReadProcessMemory
GetProcessAffinityMask
GetLogicalDriveStringsA
UnhandledExceptionFilter
GetCommandLineA
IsValidCodePage
UTRegister
FreeConsole
HeapDestroy
GetUserDefaultLangID
SetupComm
DuplicateHandle
ReadConsoleOutputA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ