Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
ea07b38cd57dd3143092eedbd9b80fac_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea07b38cd57dd3143092eedbd9b80fac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
ea07b38cd57dd3143092eedbd9b80fac_JaffaCakes118
Size
1.7MB
MD5
ea07b38cd57dd3143092eedbd9b80fac
SHA1
e8533c3fab8363bf1ba30f42cca23396807171f7
SHA256
a1fa50ed6938a8bc0d97e6565762531c6a87d5bd05380ea1cdb043d5b0a7b49a
SHA512
c9c51a231ef68ef320ca122b7836cbdf4018edf5be54cc4a97425c733aa4d5b970faada37da4b6ccf86efe543c58dc08c67c2cc1e526ea2c8737258f0b57a814
SSDEEP
24576:cf1EIzfQg4vQg4vQg4vQg4vQg4vQg4vQg4vQg4vQg4vQg4G:6joTYTYTYTYTYTYTYTYTYTG
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
GetModuleFileNameA
GetShortPathNameA
GetTempPathA
CopyFileA
SetFileAttributesA
DeleteFileA
GetSystemDirectoryA
GetWindowsDirectoryA
DeleteCriticalSection
InitializeCriticalSection
GetExitCodeThread
LoadLibraryExA
FormatMessageA
LocalFree
EnterCriticalSection
LeaveCriticalSection
GetPrivateProfileStringA
MultiByteToWideChar
lstrcpyA
lstrcatA
FindFirstFileA
lstrcmpiA
FindNextFileA
FindClose
CreateDirectoryA
GetLocalTime
VirtualQuery
SetUnhandledExceptionFilter
WriteFile
IsBadWritePtr
WritePrivateProfileStringA
OutputDebugStringA
GlobalMemoryStatus
GetLogicalDrives
GetDriveTypeA
GetDiskFreeSpaceA
GetSystemInfo
GetPrivateProfileIntA
GetPrivateProfileSectionNamesA
Sleep
TerminateProcess
GetExitCodeProcess
ResetEvent
ResumeThread
CreateEventA
InterlockedExchange
GetACP
GetLocaleInfoA
SetLastError
GetFileAttributesA
CreateFileA
SetStdHandle
VirtualProtect
SetFilePointer
GetStringTypeW
GetStringTypeA
GetCurrentProcessId
IsBadReadPtr
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
FlushFileBuffers
UnhandledExceptionFilter
GetCurrentThread
CreateProcessA
FreeLibrary
GetTickCount
LoadLibraryA
GetCurrentProcess
GetModuleHandleA
GetProcAddress
GetVersionExA
CloseHandle
ReleaseMutex
WaitForSingleObject
GetLastError
CreateMutexA
CompareStringA
CompareStringW
lstrlenA
SetEnvironmentVariableA
ReadFile
SetEndOfFile
IsBadCodePtr
HeapFree
HeapAlloc
ExitThread
GetCurrentThreadId
CreateThread
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
ExitProcess
RtlUnwind
RaiseException
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetOEMCP
GetCPInfo
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
LCMapStringA
WideCharToMultiByte
LCMapStringW
HeapSize
PeekMessageA
MsgWaitForMultipleObjects
SendMessageA
FindWindowA
RegisterClassA
MessageBoxA
ExitWindowsEx
DefWindowProcA
DestroyWindow
KillTimer
SetTimer
PostMessageA
wsprintfA
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
GetMessageA
LoadStringA
PostQuitMessage
RegDeleteKeyA
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
RegEnumValueA
OleInitialize
CoCreateInstance
OleUninitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ