Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
d5727cedbee8c9b6828ce32a7b098771_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d5727cedbee8c9b6828ce32a7b098771_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
d5727cedbee8c9b6828ce32a7b098771_JaffaCakes118
Size
164KB
MD5
d5727cedbee8c9b6828ce32a7b098771
SHA1
115e7c8b382742061ba6e5e9d759db21e66faca7
SHA256
87699a6b076fc850df50fb72263c92fe68bbe25cc2fc1d2db53fdf1b61f201d1
SHA512
56ff92da85921d383ff0f71e12efad6e5c36d40367f776c0917702ef7805eee8a7090193c55dbf184d08f7c01746c8f27dd94010a742434a34b1967cf7273042
SSDEEP
3072:OWO7tAt4roccPllkhV9nMJm6JmLfYsUcx7grY9J3+:OWOJ8nPjkhXQyfYZclgrYL+
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WahCloseHandleHelper
WahOpenNotificationHandleHelper
WahEnumerateHandleContexts
VarI2FromCy
VarI2FromI4
OleLoadPicturePath
VarR4FromUI4
CreateTypeLib
VarUI4FromCy
VariantClear
LPSAFEARRAY_UserMarshal
VarUI2FromDate
VarEqv
VarPow
VarI1FromUI2
SetErrorInfo
VarR8FromUI8
VarUI2FromI4
VarUI1FromCy
VarI4FromR4
VarR4FromBool
VarI8FromR4
BSTR_UserFree
VarI1FromUI4
VarI2FromUI8
VarI4FromI1
VarInt
VarDateFromCy
GetRecordInfoFromTypeInfo
LPSAFEARRAY_UserSize
VarDecAbs
VarI4FromUI2
VarFormat
VarUI1FromDisp
VarI1FromI8
VarBstrFromBool
VarR8FromUI4
UnRegisterTypeLib
VarUI8FromDisp
VarUI4FromR4
VarCyNeg
VarBstrFromUI4
VarFormatDateTime
VarI8FromI2
VarDecFromR8
VarI4FromI2
VarCmp
PhoneBookEnumCountries
PhoneBookGetPhoneCanonicalA
PhoneBookMatchFilter
PhoneBookGetPhoneDescA
PhoneBookGetPhoneDispA
DllRegisterServer
DriverProc
DllRegisterServer
DllCanUnloadNow
DllGetClassObject
DllUnregisterServer
SamRidToSid
SamGetDisplayEnumerationIndex
SamEnumerateUsersInDomain
SamEnumerateGroupsInDomain
SamTestPrivateFunctionsUser
SamGetGroupsForUser
SamCreateGroupInDomain
SamCreateAliasInDomain
SamQueryDisplayInformation
SamQueryInformationGroup
?s_dwMainThreadID@SC@mmcerror@@0KA
TTEmbedFontEx
TTIsEmbeddingEnabledForFacename
TTDeleteEmbeddedFont
SetNetScheduleAccountInformation
ConvertAtJobsToTasks
DllGetClassObject
GetNetScheduleAccountInformation
PathFindExtensionW
PathIsURLW
SHCreateStreamOnFileEx
PathAddBackslashA
PathMatchSpecW
SHIsLowMemoryMachine
UrlUnescapeW
UrlCreateFromPathA
PathIsFileSpecA
PathQuoteSpacesW
PathFindOnPathW
SHRegDeleteUSValueW
SHRegCloseUSKey
StrCSpnIW
StrFormatByteSizeW
StrRetToBufA
StrFormatKBSizeW
SHDeleteOrphanKeyA
PathAppendW
SHRegWriteUSValueA
StrDupW
SHRegSetUSValueW
StrSpnA
SHSetValueA
PathIsURLA
SHRegQueryUSValueA
StrToIntExW
PathQuoteSpacesA
SHRegCreateUSKeyW
AssocQueryStringByKeyW
StrCmpNA
PathCanonicalizeW
SHRegGetBoolUSValueA
StrChrNW
StrPBrkW
SHRegEnumUSValueW
AssocQueryKeyA
PathRemoveArgsW
UrlIsOpaqueA
SHEnumKeyExA
StrCpyNW
PathRemoveExtensionA
DriverProc
DllCanUnloadNow
DecodeImage
DllCanUnloadNow
DllGetClassObject
DllCanUnloadNow
KbdLayerDescriptor
InterlockedPushEntrySList
FindActCtxSectionStringA
GlobalFindAtomW
WritePrivateProfileStringW
OutputDebugStringA
CreateTimerQueueTimer
DisableThreadLibraryCalls
FindFirstVolumeMountPointA
CreateMailslotW
GetProcessShutdownParameters
lstrcmp
SetConsoleMode
GetCurrencyFormatW
GetNumberOfConsoleInputEvents
GlobalDeleteAtom
OpenConsoleW
InterlockedCompareExchange
FindFirstChangeNotificationA
lstrcpynA
PrivCopyFileExW
DelayLoadFailureHook
ReadConsoleOutputA
GetProcAddress
LZDone
GlobalCompact
TlsFree
GetModuleHandleExW
LoadResource
DeleteVolumeMountPointA
IsDBCSLeadByte
GetSystemWindowsDirectoryW
GetNamedPipeInfo
GetConsoleCursorMode
GetTimeZoneInformation
GetConsoleInputExeNameA
FreeLibrary
IsValidCodePage
GetSystemWow64DirectoryW
LocalAlloc
SetCalendarInfoW
WaitForSingleObject
SetProcessWorkingSetSize
lstrlenW
SetHandleInformation
SetProcessPriorityBoost
FindFirstFileExA
FlushConsoleInputBuffer
ReplaceFileA
SetConsoleInputExeNameA
GetCurrentThreadId
SetCommTimeouts
GetCurrencyFormatA
CreateJobSet
GetConsoleCommandHistoryA
IsWow64Process
GetNextVDMCommand
GetConsoleAliasExesLengthW
SetFileValidData
GetProfileSectionA
WritePrivateProfileSectionA
GetTempFileNameA
ContinueDebugEvent
GetConsoleFontInfo
AllocateUserPhysicalPages
GetProfileIntW
VerifyConsoleIoHandle
SetCriticalSectionSpinCount
Thread32Next
WriteConsoleInputW
SetCommBreak
GetCurrentConsoleFont
Heap32Next
CreateJobObjectA
EnumDateFormatsA
TryEnterCriticalSection
WriteConsoleInputA
ReadConsoleInputExA
VirtualQuery
GetWindowsDirectoryW
GlobalGetAtomNameW
GetCPInfoExW
CreateMutexW
FreeEnvironmentStringsA
EnumDateFormatsExA
CreateThread
CreateEventA
EnumerateLocalComputerNamesW
SetTapeParameters
SetEnvironmentVariableW
ClearCommBreak
FreeLibraryAndExitThread
lstrcpyW
FlushFileBuffers
GetVolumePathNameA
HeapSetInformation
SetFilePointer
VDMConsoleOperation
VirtualUnlock
QueryDosDeviceA
BaseDumpAppcompatCache
InterlockedExchangeAdd
FindNextFileW
MapUserPhysicalPagesScatter
FillConsoleOutputAttribute
FindFirstVolumeW
GetFileSize
IsProcessInJob
GetLogicalDriveStringsW
SetInformationJobObject
SystemTimeToFileTime
FileTimeToLocalFileTime
GetTapeParameters
GetDateFormatA
GetProcessAffinityMask
BackupWrite
GetShortPathNameA
GetLocaleInfoA
DoPrivacyDlg
DllCanUnloadNow
DoAddToFavDlg
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ