Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
dffca4ae8264083f293c362869f4c681_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dffca4ae8264083f293c362869f4c681_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
dffca4ae8264083f293c362869f4c681_JaffaCakes118
Size
655KB
MD5
dffca4ae8264083f293c362869f4c681
SHA1
27a010340c3895816314003afb64c32f6c0b4461
SHA256
2d61eedb644f26d6c133f0936f51451e274cd75f6bf45c4c988e557b1d59b986
SHA512
36455c1a21bcf6388d62c8f7d5860632ca886ea040c5df54de95c928fd31071ea2bbd2d3a808ce35b794f99a4235d189b67b1cf0d74e376df1430454c9f8a9ee
SSDEEP
12288:4Jr57KUVYij4c4wC+EUGbWMI77WLI82k+tvT3q7BDdn:4J4UVFjPfC+EUGbZk7WLotvTAh
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord17
WaitForSingleObject
SetEvent
ResetEvent
WaitForMultipleObjects
VirtualAlloc
VirtualFree
GetProcAddress
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
GetLastError
LoadLibraryA
AreFileApisANSI
GetModuleFileNameA
GetModuleFileNameW
LocalFree
FormatMessageA
FormatMessageW
SetFileAttributesA
RemoveDirectoryA
SetCurrentDirectoryA
CreateDirectoryA
DeleteFileA
SetFileAttributesW
RemoveDirectoryW
CreateDirectoryW
DeleteFileW
lstrlenA
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryW
GetTempPathA
GetTempPathW
GetFullPathNameW
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
CreateFileA
CreateThread
SetFilePointer
ReadFile
SetFileTime
WriteFile
SetEndOfFile
CreateFileW
CreateEventA
GetStdHandle
EnterCriticalSection
LeaveCriticalSection
GetUserDefaultLangID
EnumResourceLanguagesA
GetUserDefaultUILanguage
GetVersionExA
Sleep
SetLastError
DuplicateHandle
GetCurrentProcess
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
CreateProcessA
GetCommandLineW
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
GetOEMCP
GetACP
GetCPInfo
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
GetFileSize
HeapSize
HeapCreate
HeapDestroy
HeapReAlloc
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
RaiseException
RtlUnwind
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
TlsGetValue
CharLowerA
CharUpperA
DestroyWindow
PostMessageA
ShowWindow
EndDialog
KillTimer
SetTimer
SendMessageA
GetDlgItem
MessageBoxW
DialogBoxParamW
DialogBoxParamA
GetWindowLongA
SetWindowLongA
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
LoadStringW
LoadStringA
CharLowerW
CharUpperW
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
SHCreateDirectoryExW
SHGetPathFromIDListW
SHCreateDirectoryExA
ShellExecuteExA
SHBrowseForFolderW
OleInitialize
CoTaskMemFree
SysAllocString
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ