Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
df085a41e6cc782f9a50377776207d25_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
df085a41e6cc782f9a50377776207d25_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
df085a41e6cc782f9a50377776207d25_JaffaCakes118
Size
539KB
MD5
df085a41e6cc782f9a50377776207d25
SHA1
befbd5472dc1ab119e74aee77e12a02129786d45
SHA256
a188e898e18b096fd670574c011fd115946174c091b8f67722b59a4bed62d377
SHA512
dce5686880619f919d61444d7269ac397880cfc3469eafc1dec2c208fec51a32db9babd8420af4228c0bb395c63de5221dc2ebbadd1eaff2e6766653c4fc0ce7
SSDEEP
12288:WKaVqt7Ray7+ic+FUotettWbCfL+ed5uTYUY/xwYrTsTyuWt/:WhQzaftQigIHTsTyuWN
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
c:\buildbot\slave\w\LAR6\desktop-2013-1\chromium\src\out\Release\opera_crashreporter.exe.pdb
InternetQueryDataAvailable
InternetReadFile
HttpQueryInfoW
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetSetOptionW
InternetConnectW
InternetCloseHandle
InternetOpenW
InternetCrackUrlW
GetProcessImageFileNameW
GetProcessMemoryInfo
GetMappedFileNameA
timeGetTime
SHGetValueA
UnregisterWait
RtlCaptureContext
CloseHandle
SetUnhandledExceptionFilter
WaitForSingleObject
CreateEventW
Sleep
InterlockedCompareExchange
GetCurrentThread
GetCurrentThreadId
SuspendThread
CreateProcessW
GetModuleFileNameW
SystemTimeToFileTime
GetVersionExW
GetNativeSystemInfo
QueueUserWorkItem
GetTempPathW
CreateFileW
GetFileSize
SetEndOfFile
SetFilePointer
OpenProcess
ReadProcessMemory
FreeLibrary
LoadLibraryW
InterlockedIncrement
GetLogicalDriveStringsW
QueryDosDeviceW
CreateToolhelp32Snapshot
Thread32First
Thread32Next
Module32FirstW
Module32NextW
InterlockedDecrement
RegisterWaitForSingleObject
GetCurrentProcess
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
OpenThread
GetThreadPriority
GetThreadContext
VirtualQueryEx
SetLastError
HeapCreate
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
HeapSetInformation
TlsGetValue
FindClose
InterlockedExchange
SwitchToThread
TlsAlloc
TlsSetValue
GetSystemInfo
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
GetEnvironmentVariableA
Module32First
Module32Next
GetModuleHandleA
WriteFile
GetCommandLineW
IsDebuggerPresent
GetCurrentDirectoryW
LocalFree
GetFileAttributesW
GetFileAttributesExW
GetLongPathNameW
GetTempFileNameW
ReadFile
RemoveDirectoryW
SetFileAttributesW
CopyFileW
MoveFileW
MoveFileExW
ReplaceFileW
OutputDebugStringA
ReleaseMutex
CreateMutexW
GetTickCount
FormatMessageA
MultiByteToWideChar
WideCharToMultiByte
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
FlushFileBuffers
SetFilePointerEx
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetSystemDirectoryW
GetWindowsDirectoryW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
DuplicateHandle
RaiseException
IsProcessorFeaturePresent
TlsFree
GetModuleHandleExW
UnregisterWaitEx
ResetEvent
ConnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeW
GetOverlappedResult
InitializeCriticalSection
GetProcessTimes
GetDriveTypeW
GetSystemTime
GetCurrentProcessId
OpenEventW
SetEvent
GetLastError
DebugActiveProcessStop
DebugActiveProcess
DeleteFileW
DeleteFileA
SetCurrentDirectoryW
GetEnvironmentVariableW
GetProcAddress
GetModuleHandleW
GetACP
GetOEMCP
GetCPInfo
LoadLibraryExW
SetEnvironmentVariableA
ReadConsoleW
GetTimeZoneInformation
WriteConsoleW
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
OutputDebugStringW
DecodePointer
EncodePointer
CreateDirectoryW
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
RtlUnwind
GetConsoleMode
GetConsoleCP
GetProcessHeap
GetFileType
SetStdHandle
GetFullPathNameW
AreFileApisANSI
ExitProcess
GetCommandLineA
LoadLibraryExA
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
CoTaskMemFree
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ