Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
13561278a40bcfc7cdcb92f90bbf044f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13561278a40bcfc7cdcb92f90bbf044f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
13561278a40bcfc7cdcb92f90bbf044f_JaffaCakes118
Size
117KB
MD5
13561278a40bcfc7cdcb92f90bbf044f
SHA1
ee916652a8917b0a67205b3172ed1b79df41fab5
SHA256
ae7c643b2c13c61a6cb578bffa3f71c396ac036402430d6c352643745d35f7bb
SHA512
657e0463fe35d762bd46fee99f1e5bd7bf1e05ef5dd4d82a9e3b28b60d6c8a8a0a034318797ba08f01476f4ec447081a28a2b6760c94978e1948c81f4212418e
SSDEEP
3072:t4kHtEN476CHd6kqr8h26jEGcWmrjy7zb4/r:ekHt+4GCHd6Z8RjYjyXor
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GlobalAlloc
EnumTimeFormatsW
SetEvent
CreateFileMappingA
CreateNamedPipeW
GetNamedPipeInfo
ReadDirectoryChangesW
GetSystemDefaultLangID
GetCPInfo
GetTempFileNameA
GetTickCount
FindResourceA
CreateMutexW
LocalFree
CompareStringW
IsBadWritePtr
GetCurrentProcess
lstrlen
VirtualAlloc
GetStringTypeA
IsBadStringPtrA
GetThreadLocale
LoadLibraryA
SetCurrentDirectoryW
ConnectNamedPipe
IsDebuggerPresent
GetNumberFormatA
GetVolumeInformationW
FileTimeToLocalFileTime
CopyFileA
GetOEMCP
GetWindowsDirectoryA
GetEnvironmentStringsW
MoveFileA
WaitForSingleObject
lstrcmpi
lstrcmp
GetLongPathNameW
GetSystemInfo
GetDiskFreeSpaceW
CharUpperA
CallWindowProcA
GetSystemMetrics
GetWindowLongA
SetWindowRgn
CopyAcceleratorTableA
DestroyCursor
RegisterClassExW
GetCaretPos
FindWindowA
FindWindowW
CallWindowProcW
DrawIcon
LoadMenuIndirectW
EnableMenuItem
GetMenuStringA
DestroyMenu
mouse_event
GetClassLongW
ArrangeIconicWindows
wvsprintfW
CheckRadioButton
InsertMenuW
IsWindow
IsDlgButtonChecked
GetMenuItemInfoA
LoadMenuA
EnumDesktopsW
EnumDesktopWindows
GetDlgItemTextW
CheckMenuItem
SetDlgItemTextW
SetCursor
CreateDialogIndirectParamW
GetDlgItem
CreateScalableFontResourceA
GetGlyphOutlineW
EqualRgn
CopyMetaFileA
RemoveFontResourceExW
SetWindowOrgEx
PolylineTo
ColorMatchToTarget
AddFontResourceW
GetEnhMetaFileA
GetCharWidthFloatA
RemoveFontMemResourceEx
GetTextColor
TranslateCharsetInfo
CreateFontIndirectExA
RegQueryInfoKeyW
RegQueryValueExW
StrRStrIA
StrChrA
Shell_NotifyIcon
ShellExecuteExW
StrNCmpA
DuplicateIcon
SHBrowseForFolder
StrStrIA
GetFileTitleW
glColor4fv
glGetTexParameteriv
glTexCoord1dv
glRectd
glGetDoublev
glClearStencil
glGetTexEnviv
glVertex4dv
auxSetVolume
mciGetDeviceIDA
mciSendStringW
I_CryptUnregisterSmartCardStore
RegQueryInfoKeyU
CertVerifyValidityNesting
CertFindSubjectInCTL
I_CryptGetOssGlobal
CertAddEncodedCertificateToSystemStoreA
CertFindCRLInStore
CertAddEncodedCertificateToStore
CryptEncryptMessage
CertRegisterSystemStore
CertRemoveStoreFromCollection
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ