Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
0622f3de6f23fc527397f8eb30aedf04_JaffaCakes118.exe
Resource
win7-20240903-en
Target
0622f3de6f23fc527397f8eb30aedf04_JaffaCakes118
Size
162KB
MD5
0622f3de6f23fc527397f8eb30aedf04
SHA1
c7ade7f668c165c21ff7505e1480fe8c697e5f99
SHA256
eeab655c600fb861b19902473d034b79f3dad940a325e85b2d94159907982c89
SHA512
adaceb184ec3a56cbe6b38ccc9b577ce2ffe8166c6e40984d2a0f085ccccb60d8b095b4098153514496dc8239932776974ade81dabe09d8797de378e099e2e34
SSDEEP
3072:IuZWCVy0bmev4HTNHk0Z4oFlSRHfIMUAQARY7cEeYQfj:IQyJeQHk0ZTCRHKABuIpYQr
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHGetFolderPathA
ShellExecuteA
SHFileOperationA
Shell_NotifyIconA
SHGetSpecialFolderPathA
InitCommonControlsEx
WSAStartup
htons
inet_addr
gethostbyname
socket
connect
closesocket
WSACleanup
StrChrA
StrRChrA
StrFormatByteSizeA
StrCmpW
StrStrA
PathAppendA
StrToIntA
wnsprintfA
PathStripPathA
PathRemoveFileSpecA
PathCombineA
GetAdaptersInfo
IsBadCodePtr
IsBadReadPtr
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
GetStringTypeW
GetStringTypeA
TlsGetValue
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
RaiseException
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
GetLastError
GetProcAddress
GetModuleHandleA
CloseHandle
CreateMutexA
WideCharToMultiByte
CreateFileA
WriteFile
MapViewOfFileEx
CreateFileMappingA
GetFileSize
UnmapViewOfFile
lstrlenA
Sleep
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
GetSystemTime
FreeLibrary
GetCurrentProcess
GetCurrentThreadId
LoadLibraryA
SetStdHandle
ExitProcess
FreeResource
GetCommandLineA
GetFileAttributesA
CreateProcessA
CopyFileA
SetErrorMode
SetUnhandledExceptionFilter
lstrcatA
GetModuleFileNameA
GetPrivateProfileIntA
WritePrivateProfileStringA
RemoveDirectoryA
DeleteFileA
lstrcmpA
GetTickCount
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateDirectoryA
lstrcpynA
GetTempPathA
ReadFile
SetFilePointer
FlushFileBuffers
TerminateThread
WaitForSingleObject
FindClose
FindNextFileA
FindFirstFileA
TerminateProcess
CreateThread
GetExitCodeProcess
GetSystemTimeAsFileTime
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
ResumeThread
SetEvent
WaitForMultipleObjects
CreateEventA
GetVolumeInformationA
CompareFileTime
FileTimeToSystemTime
LocalAlloc
GetSystemDirectoryA
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCPInfo
GetOEMCP
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualFree
HeapCreate
GetStartupInfoA
RtlUnwind
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
lstrcpyA
LocalFree
PeekMessageA
DefWindowProcA
PostQuitMessage
EndDialog
IsWindow
SetForegroundWindow
GetSystemMenu
DeleteMenu
SetWindowTextA
GetDlgItem
IsWindowVisible
SendMessageA
GetDlgItemTextA
DialogBoxParamA
DestroyWindow
SetTimer
KillTimer
wsprintfA
CreateDialogParamA
ShowWindow
UpdateWindow
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
LoadStringA
RegisterWindowMessageA
PostMessageA
LoadIconA
LoadCursorA
GetSysColorBrush
RegisterClassExA
LoadImageA
PostThreadMessageA
GetSysColor
GetWindowTextLengthA
SetDlgItemTextA
SetWindowPos
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
GetUserNameA
RegFlushKey
RegCreateKeyExA
RegSetValueExA
CoInitialize
CoCreateInstance
CoUninitialize
OleRun
SysAllocString
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ