Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
fb3a8e6b1d140a4633803696136f8e54_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb3a8e6b1d140a4633803696136f8e54_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fb3a8e6b1d140a4633803696136f8e54_JaffaCakes118
Size
602KB
MD5
fb3a8e6b1d140a4633803696136f8e54
SHA1
d4de5c34a8f0a9e747718e06dc6e4f015252a06e
SHA256
4eb0ab38ba9e74f40c2294ab6cd563b66eed1e817ddf16f59ca2ce572c9718b8
SHA512
e25f0c991e1a9e863bc653dc9b33e864b6bb5f3466e25b02e3c599ff70973c56d929674f57f6a13bb3bdb3be64488b1d5a856c7bc8d51e75aa9f03dec119a595
SSDEEP
12288:N2lsEzJO9D23VnzykQ3kLzMCo2ulfmaHxH3Kwu2/0:N2lsCJO9DSzTpMC6OMH3K12/0
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
MultiByteToWideChar
GetTempFileNameW
GetTempPathW
CreateDirectoryW
InterlockedDecrement
VerSetConditionMask
VerifyVersionInfoW
WaitForSingleObject
GlobalAlloc
GlobalFree
GetModuleHandleW
GetProcAddress
OpenEventW
GetCurrentThreadId
SetEvent
ResetEvent
OutputDebugStringW
FreeLibrary
GetCurrentThread
GetStartupInfoW
SetLastError
GetCommandLineW
GetModuleFileNameW
FreeResource
EnumResourceNamesW
SetFileAttributesW
FindFirstFileW
FindClose
CompareFileTime
FileTimeToSystemTime
HeapAlloc
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
ReleaseMutex
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
SystemTimeToTzSpecificLocalTime
GetStdHandle
WideCharToMultiByte
GetProcessId
GetExitCodeProcess
HeapReAlloc
HeapDestroy
HeapSize
SetEndOfFile
WriteConsoleW
LoadLibraryW
SetEnvironmentVariableW
LoadLibraryExW
QueryPerformanceCounter
FlushFileBuffers
ReadConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleHandleExW
ExitProcess
GetOEMCP
GetACP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
RaiseException
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
GetFileType
SetStdHandle
ReadFile
GetSystemDefaultLCID
GetLocaleInfoW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetFileSize
Sleep
TerminateThread
GetLastError
WaitForMultipleObjects
PulseEvent
CreateEventW
GetCurrentProcessId
CloseHandle
WriteFile
SetFilePointer
CreateFileW
DeleteFileW
CreateThread
GetCurrentProcess
TerminateProcess
LocalFree
LocalAlloc
GetTickCount
IsProcessorFeaturePresent
IsDebuggerPresent
GetStringTypeW
DecodePointer
EncodePointer
InterlockedIncrement
HeapFree
SendMessageW
PostMessageW
wsprintfW
wsprintfA
MessageBoxA
EnumWindows
GetWindowTextW
GetAncestor
GetWindowInfo
GetWindow
SetFocus
SetActiveWindow
BringWindowToTop
GetWindowThreadProcessId
SetForegroundWindow
PostQuitMessage
EndPaint
BeginPaint
CreateDialogParamW
DefWindowProcW
DestroyWindow
SetWindowLongW
GetWindowLongW
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
LoadStringW
KillTimer
EndDialog
InvalidateRect
SetDlgItemTextW
SetTimer
GetDesktopWindow
FillRect
GetClientRect
GetDlgItem
SetWindowPos
SystemParametersInfoW
GetWindowRect
CreateSolidBrush
Rectangle
SelectObject
GetStockObject
SetBkColor
SetTextColor
CreateFontIndirectW
GetObjectW
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoInitialize
CoInitializeSecurity
CoInitializeEx
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysStringLen
VariantInit
VariantClear
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ