Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
fca3a22abbcd8ebae3a5f841af9299fe_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fca3a22abbcd8ebae3a5f841af9299fe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
fca3a22abbcd8ebae3a5f841af9299fe_JaffaCakes118
Size
183KB
MD5
fca3a22abbcd8ebae3a5f841af9299fe
SHA1
b7e58ab8ecd1f11a79876036b9302847b1f848d1
SHA256
09560cf29cb05420b063ef2a57dd60e91f848e2dfeb083c592b959a42fc3dc32
SHA512
bf2985a13268c22d046e6d0316b4b6aa4b158d74f29a3658172312337ca63cbf41c64ac57a7c94ba972b65fad2f612f472e53252edda7e4e2b254adc0976e904
SSDEEP
3072:LDFQw9gBuNvfOfDtpqP7CjI7uxSav/Dp1/toOY93S7vp6t5bFruFgT:Hl9/NeyzMIyJdBC7rBFruFs
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FlushViewOfFile
SetFileAttributesA
GetDriveTypeW
OpenMutexA
RtlFillMemory
SetProcessWorkingSetSize
SetFileApisToOEM
IsBadReadPtr
WaitForMultipleObjects
EnumSystemCodePagesA
GetFileSize
Beep
SetConsoleFont
VirtualAlloc
LocalLock
LocalAlloc
Sleep
GetConsoleScreenBufferInfo
lstrlenW
IsDebuggerPresent
EnumSystemLanguageGroupsA
IsSystemResumeAutomatic
GetProcessIoCounters
FillConsoleOutputAttribute
LocalSize
lstrcatW
CompareFileTime
FileTimeToDosDateTime
GetCurrentThreadId
CancelDeviceWakeupRequest
WinExec
OpenSemaphoreA
GetCurrentProcess
GetGeoInfoA
lstrcpynW
TerminateJobObject
GetWriteWatch
CreateProcessW
GetCPInfoExA
ReadConsoleOutputAttribute
ExpandEnvironmentStringsA
SetConsoleCP
GetProcAddress
LoadLibraryExA
SetLastError
GetCommandLineA
FindNextVolumeMountPointW
HideCaret
CharPrevW
GetAsyncKeyState
GetWindowLongW
UpdateWindow
SendIMEMessageExW
SetWindowStationUser
DestroyAcceleratorTable
InsertMenuA
GetDC
GetMonitorInfoA
AnimateWindow
GetDlgItem
UserHandleGrantAccess
DlgDirSelectComboBoxExA
SoftModalMessageBox
ScrollWindowEx
IMPGetIMEW
CheckRadioButton
EnumDisplaySettingsExW
CreateMDIWindowW
CreateWindowExA
DestroyIcon
EnableWindow
RegisterClipboardFormatW
DdeCreateDataHandle
DrawTextExA
DdeEnableCallback
LockWindowUpdate
GetWindowTextA
TabbedTextOutW
RegisterShellHookWindow
GetWindowContextHelpId
IsCharUpperW
UnhookWindowsHook
RegisterLogonProcess
BroadcastSystemMessage
WINNLSEnableIME
SetCursorContents
EnumWindowStationsA
TranslateMessage
IsCharAlphaW
SetProgmanWindow
SetSysColorsTemp
StartServiceCtrlDispatcherA
StopTraceW
EncryptionDisable
SetEntriesInAclA
RegDeleteValueW
CryptEncrypt
QueryServiceStatusEx
WmiOpenBlock
FreeInheritedFromArray
CryptGetUserKey
AdjustTokenGroups
WmiQuerySingleInstanceA
WmiNotificationRegistrationW
MakeAbsoluteSD
LsaICLookupSids
I_ScSendTSMessage
LsaOpenTrustedDomain
AssocQueryStringByKeyW
PathRemoveArgsW
PathIsDirectoryW
SHCreateStreamOnFileW
StrToIntA
StrToIntExW
ImageList_AddMasked
ImageList_Read
LBItemFromPt
ImageList_DragMove
ImageList_SetFilter
ImageList_SetBkColor
ImageList_BeginDrag
CoFileTimeNow
CoInitializeEx
StringFromCLSID
CoGetClassObject
GetClassFile
CoGetPSClsid
CoGetCallerTID
CLSIDFromString
CoDisconnectObject
VerLanguageNameW
GetFileVersionInfoA
CoInternetCreateSecurityManager
CreateAsyncBindCtx
UrlMkGetSessionOption
RegisterBindStatusCallback
URLDownloadToFileW
IsJITInProgress
HlinkGoForward
MimeOleCreateByteStream
MimeOleGetFileInfo
MimeOleSetPropA
MimeOleAlgNameFromSMimeCap
HrGetAttachIconByFile
MimeOleGetFileExtension
MimeOleCreateVirtualStream
EssSecurityLabelEncodeEx
MimeOleSetCompatMode
rewind
_fsopen
_execve
_strspnp
_strinc
_locking
_amsg_exit
_scalb
_isnan
_getdrive
_CIpow
_mbsnicmp
_ismbcprint
UnloadPerfCounterTextStringsA
InstallPerfDllW
??_Dostream_withassign@@QAEXXZ
??4fstream@@QAEAAV0@AAV0@@Z
?setbuf@streambuf@@UAEPAV1@PADH@Z
??4istream_withassign@@QAEAAVistream@@ABV1@@Z
?open@fstream@@QAEXPBDHH@Z
?delbuf@ios@@QBEHXZ
??0Iostream_init@@QAE@XZ
?setbuf@ifstream@@QAEPAVstreambuf@@PADH@Z
?pbump@streambuf@@IAEXH@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ