Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2f5c97db30c2316d08623a7fa842e213_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2f5c97db30c2316d08623a7fa842e213_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
2f5c97db30c2316d08623a7fa842e213_JaffaCakes118
Size
157KB
MD5
2f5c97db30c2316d08623a7fa842e213
SHA1
173d5d841b9c6cf5f444ed3dc8611dc517ba93cf
SHA256
c9c9f59879e0972ef58138703c8e7722cf6d3014a25550d7bb9bcf3fc2beaf44
SHA512
24221318d014a256e4cc8f8dd7a7b0b7b74a1beb159c46123521d0835c00cfc52ce1c53bb64b9076d576add8b7cdf9f47a191735ec28f52ea3f70814680359b8
SSDEEP
3072:vYgq3l0lDBaYErMwafpgRbIrW1lMDi/V9bDU4VtxLvny3:vYgq3l0lcrMZsbMWDMDaTPJLfO
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcessId
TlsSetValue
CreateThread
ResumeThread
GetCurrentThread
TlsGetValue
TlsAlloc
WaitForMultipleObjects
WideCharToMultiByte
MultiByteToWideChar
QueryPerformanceCounter
HeapDestroy
GetFileType
SetHandleCount
InitializeCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
GetCPInfo
GetOEMCP
GetACP
HeapSize
SetUnhandledExceptionFilter
TlsFree
SetLastError
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
HeapFree
GetCommandLineA
DeleteCriticalSection
RaiseException
RtlUnwind
GetCurrentProcess
OpenProcess
CloseHandle
ExpandEnvironmentStringsA
GetLastError
HeapCreate
VirtualFree
ReadFile
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
InterlockedExchange
VirtualQuery
SetFilePointer
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
CreateFileA
ExitProcess
SetStdHandle
VirtualProtect
GetSystemInfo
GetTickCount
SetEndOfFile
WaitForSingleObject
TerminateProcess
GetCurrentThreadId
GetModuleFileNameA
FormatMessageA
LoadLibraryA
GetProcAddress
FreeLibrary
ResetEvent
CreateEventA
SetEvent
GetVersionExA
LeaveCriticalSection
GetStartupInfoA
EnterCriticalSection
Sleep
LocalFree
GetEnvironmentStringsW
GetModuleHandleA
DefWindowProcA
CreateWindowExA
RegisterClassA
UnregisterClassA
PeekMessageA
MsgWaitForMultipleObjects
GetDesktopWindow
IsWindow
IsIconic
GetClientRect
ClientToScreen
KillTimer
SetTimer
SetWindowPos
PostThreadMessageA
MessageBoxA
SystemParametersInfoA
SendMessageA
GetDlgItem
IsWindowVisible
GetWindowRect
IsRectEmpty
GetMessageA
DispatchMessageA
DestroyWindow
EnableWindow
SetDlgItemTextA
SetDlgItemInt
GetDlgItemTextA
GetDlgItemInt
DialogBoxParamA
EndDialog
SetWindowLongA
GetWindowLongA
FindWindowA
GetProcessWindowStation
EnumDesktopsA
OpenDesktopA
EnumDesktopWindows
CloseDesktop
GetClassNameA
GetWindowThreadProcessId
LoadImageA
PropertySheetA
CreatePropertySheetPageA
htonl
inet_addr
inet_ntoa
RegQueryInfoKeyA
RegSetValueExA
RegNotifyChangeKeyValue
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegCreateKeyA
GetUserNameA
OpenProcessToken
CopySid
GetLengthSid
IsValidSid
FreeSid
AllocateAndInitializeSid
GetTokenInformation
RegEnumValueA
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ