Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
16d1db59a64ebba306cc99fb377ad258_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16d1db59a64ebba306cc99fb377ad258_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
16d1db59a64ebba306cc99fb377ad258_JaffaCakes118
Size
3.4MB
MD5
16d1db59a64ebba306cc99fb377ad258
SHA1
63b73a15735d84f41e2ee672882be4bfe7c50c14
SHA256
3fccb488be140d3944dbcc9e51f30f21d9dc89e99bfcb3ecb328c6f20cde75a1
SHA512
2ca81146506f3f26eea30c247e3583d6bad1df1c69acbea4c5ca355cecd308652ce8d2f6829b878f6966fe8713420c7536f251effc7f94d93c274da5c1929cf9
SSDEEP
98304:/rYiAof5F37CWNZnKVH9gISAux8qqZg1mHiugehOfn:/rjj5cAxKLgISAux8HgqNhOfn
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
CreateThread
WaitForSingleObject
SetEvent
ResetEvent
WaitForMultipleObjects
CompareStringA
GetLastError
WideCharToMultiByte
MultiByteToWideChar
CompareStringW
lstrlenA
LoadLibraryA
AreFileApisANSI
GetModuleFileNameA
GetModuleFileNameW
FormatMessageA
LocalFree
FormatMessageW
SetFileAttributesA
RemoveDirectoryA
SetCurrentDirectoryA
GetWindowsDirectoryA
SetFileAttributesW
RemoveDirectoryW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
GetShortPathNameA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
GetTempPathA
GetTempFileNameA
FindClose
FindFirstFileA
SetLastError
FindFirstFileW
FindNextFileA
CreateFileA
CreateFileW
GetFileSize
SetFilePointer
ReadFile
SetFileTime
WriteFile
SetEndOfFile
CreateEventA
EnterCriticalSection
LeaveCriticalSection
Sleep
GetCommandLineW
CreateProcessA
IsBadReadPtr
SetUnhandledExceptionFilter
RaiseException
GetSystemInfo
VirtualProtect
IsBadCodePtr
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCPInfo
GetOEMCP
GetACP
VirtualQuery
InterlockedExchange
RtlUnwind
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
TlsGetValue
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
HeapAlloc
HeapReAlloc
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
HeapSize
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
GetCurrentThreadId
TlsFree
TlsSetValue
MessageBoxA
PostMessageA
ShowWindow
DestroyWindow
EndDialog
GetDlgItem
KillTimer
SetTimer
SendMessageA
MessageBoxW
DialogBoxParamA
GetWindowLongA
SetWindowLongA
SetWindowTextW
LoadStringW
LoadStringA
CharPrevA
SetWindowTextA
VariantClear
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ