Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
373b1f29ac691567e4446eaf3b8360dd_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
373b1f29ac691567e4446eaf3b8360dd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
373b1f29ac691567e4446eaf3b8360dd_JaffaCakes118
Size
621KB
MD5
373b1f29ac691567e4446eaf3b8360dd
SHA1
232882b2e8fb7933f287c05daef225d397b20c8b
SHA256
7febfa1a9dc6bc66aeb1bde6465f56286be81cf90336dde801b2745c96b235af
SHA512
65101e9b56296785a42216bd139c0b5241ede02a5a84e5dc11e61bb41037bfa6188fc9200ad82d94ec4fb3e8e902514684552cb4ede2966be57fd0a87477b5a0
SSDEEP
12288:+TTejkSrSm68nIB50euunHOCXTdF3P6i9:sGIxHLT3Si9
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
TerminateProcess
CloseHandle
WaitForSingleObject
OpenProcess
lstrcmpA
ReadFile
SetFilePointer
CreateFileA
FreeLibrary
GetProcAddress
LoadLibraryExA
DeleteFileA
SetFileAttributesA
GetFileAttributesA
OutputDebugStringA
GetCurrentProcessId
GetWindowsDirectoryA
WriteFile
GetFileSize
GetShortPathNameA
MoveFileExA
GetVersionExA
GetSystemDirectoryA
LoadLibraryA
CreateProcessA
GetACP
GetLocaleInfoA
GetThreadLocale
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
GetCommandLineA
GetStartupInfoA
VirtualFree
HeapCreate
ExitProcess
GetStdHandle
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
LCMapStringA
LCMapStringW
GetModuleHandleA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
SetEnvironmentVariableA
GetTempFileNameA
MoveFileA
lstrcpyA
ReleaseMutex
OpenMutexA
CreateMutexA
FileTimeToSystemTime
CopyFileA
GetVolumeInformationA
LocalFree
LocalAlloc
GetPrivateProfileStringA
OpenFile
GetUserDefaultLangID
GetSystemDefaultLangID
OpenEventA
Process32Next
GetExitCodeProcess
Process32First
CreateToolhelp32Snapshot
CreateThread
CreateEventA
SetEvent
ExpandEnvironmentStringsA
lstrcatA
FormatMessageA
IsBadWritePtr
LoadLibraryW
RemoveDirectoryA
Sleep
GetTempPathA
FindFirstFileA
FindNextFileA
FindClose
GetModuleFileNameA
lstrlenA
lstrcmpiA
lstrlenW
GetVersion
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
FreeEnvironmentStringsA
InterlockedExchange
RegisterWindowMessageA
SendMessageTimeoutA
GetDesktopWindow
EnumChildWindows
FindWindowA
FindWindowExA
UnregisterClassA
PostMessageA
CharUpperA
GetClassNameA
SendMessageA
ExitWindowsEx
UpdateWindow
DispatchMessageA
PeekMessageA
GetDlgItem
SetDlgItemTextA
EnumWindows
MessageBoxA
TranslateMessage
PostThreadMessageA
GetMessageA
CharNextA
SystemParametersInfoA
LoadCursorFromFileA
CopyImage
SetSystemCursor
GetWindowThreadProcessId
PathFileExistsA
PathAppendA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CryptAcquireContextA
RegCreateKeyExA
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
CryptHashData
CryptDecrypt
CryptDestroyKey
CryptDeriveKey
CryptDestroyHash
CryptCreateHash
CryptReleaseContext
RegEnumValueA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetSecurityDescriptorSacl
RegQueryInfoKeyA
RegCreateKeyA
RegEnumKeyA
RegDeleteKeyA
RegEnumKeyExA
SHGetSpecialFolderPathA
ShellExecuteExA
CoUninitialize
CLSIDFromString
CoCreateInstance
StringFromGUID2
CoRevokeClassObject
CoRegisterClassObject
CoInitialize
CoTaskMemFree
OleRun
CLSIDFromProgID
UnRegisterTypeLi
LoadTypeLi
SysAllocString
VarBstrCmp
SysStringLen
SysStringByteLen
SysAllocStringByteLen
VariantClear
VariantInit
SysFreeString
SysAllocStringLen
RegisterTypeLi
ord17
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ