Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
3a8fa8df90f0dc731eeed12262019ee6_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3a8fa8df90f0dc731eeed12262019ee6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
3a8fa8df90f0dc731eeed12262019ee6_JaffaCakes118
Size
219KB
MD5
3a8fa8df90f0dc731eeed12262019ee6
SHA1
13d16b71870d25a663e0ae3e5c2cf11f7a0c661f
SHA256
84898054031f264e4f490cd4671bd729c209ed537be11f6e15091604bb54766a
SHA512
3685f8f4c007f68138f3fd73c6223031de66f0149c07f12864f31f7036c23b2598dd966993812df27135709c21cb74529d6387e4368b4228029d4932314b66ce
SSDEEP
3072:Ev3J0EDB+MWa6Ah0d1ssAx3ay0VZsrSSFamPDpNnA+6ygc+fZuckQ1tpitan:Ev7p9h0v4xKNBOamPDp3Zgc+ockQ8tan
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
WaitForSingleObject
SetEvent
FreeLibrary
CloseHandle
Sleep
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
GetLastError
ResetEvent
GetTickCount
InterlockedExchange
CancelIo
GetLocalTime
GetCurrentProcessId
DeleteFileA
CreateDirectoryA
GetFileAttributesA
lstrcpyA
lstrlenA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
LocalReAlloc
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
lstrcatA
CreateProcessA
InitializeCriticalSection
lstrcmpiA
MapViewOfFile
CreateFileMappingA
HeapFree
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
LocalSize
TerminateProcess
OpenProcess
GetCurrentThreadId
GetSystemInfo
GetComputerNameA
GetVersionExA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
HeapAlloc
GetProcessHeap
InterlockedDecrement
OpenEventA
SetErrorMode
MultiByteToWideChar
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
lstrlenW
SetEnvironmentVariableA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
LCMapStringW
RtlUnwind
RaiseException
CreateThread
TlsSetValue
TlsGetValue
ExitThread
GetModuleHandleA
GetCommandLineA
GetVersion
ExitProcess
TlsAlloc
TlsFree
SetLastError
GetCurrentThread
FatalAppExitA
SetUnhandledExceptionFilter
GetModuleFileNameA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
WriteFile
IsBadReadPtr
IsBadCodePtr
InterlockedIncrement
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
FlushFileBuffers
SetStdHandle
SetConsoleCtrlHandler
LCMapStringA
CompareStringW
CoCreateInstance
OleRun
CLSIDFromString
CoInitialize
CoUninitialize
CLSIDFromProgID
VariantClear
SysFreeString
SysAllocString
GetErrorInfo
SetErrorInfo
VariantInit
VariantChangeType
CreateErrorInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ