Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
43f481232ceb7f96573fefe5801405c9_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
43f481232ceb7f96573fefe5801405c9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
43f481232ceb7f96573fefe5801405c9_JaffaCakes118
Size
91KB
MD5
43f481232ceb7f96573fefe5801405c9
SHA1
337e16d0173f0b4cb8bf101b506dd5af18ccc5e0
SHA256
a524f6c1d5b06491ae8e4464980349a479f0baf6a3fa5068d11680fbb92ea053
SHA512
ab017385573a3d7a8a0f7ba84308d6703d8a43a19162f8ac1cd11c13f069f66a62b08ad93197dd153d40974f7a9826bc79fe8f3ebf4a30b7c291d0f43dad40e3
SSDEEP
1536:ka4bbCgEFGotsyBg/7xwAF3jAbSh6XafQwsOQIfPOfLMz3nYiRXNwCa:wbHeGottBg/7xwGMbSvKOZXODMz3nYqI
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
FlushInstructionCache
GetCurrentThreadId
GetLastError
lstrcmpiW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
lstrlenA
DebugBreak
OutputDebugStringW
EnterCriticalSection
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
Sleep
InterlockedExchange
RaiseException
LocalFileTimeToFileTime
GetFileSizeEx
SetFilePointerEx
ReadFile
CreateMutexW
GetEnvironmentVariableW
SetEnvironmentVariableW
TlsFree
TlsAlloc
OpenThread
TlsSetValue
TlsGetValue
ReleaseMutex
WaitForSingleObject
CreateFileA
GetSystemTimeAsFileTime
LoadLibraryW
FormatMessageW
InterlockedIncrement
ExpandEnvironmentStringsW
GetVersion
InterlockedDecrement
GetCurrentProcessId
CreateFileW
DeviceIoControl
lstrlenW
GetCurrentProcess
CloseHandle
GetModuleHandleW
GetProcAddress
GetSystemTime
LocalFree
SetLastError
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
SystemTimeToFileTime
GetVersionExW
SendMessageW
wsprintfW
GetActiveWindow
MessageBoxW
UnregisterClassA
SetWindowLongW
TranslateAcceleratorW
LoadMenuW
LoadAcceleratorsW
CheckMenuRadioItem
SetWindowPos
CallWindowProcW
LoadStringA
PostQuitMessage
SetFocus
ShowWindow
SetMenuDefaultItem
GetMenuItemInfoW
SetMenuItemInfoW
GetClientRect
GetWindowLongW
LoadStringW
InvalidateRect
GetWindowRect
CreateWindowExW
GetClassInfoExW
LoadCursorW
LoadImageW
RegisterClassExW
DestroyWindow
CharNextW
DefWindowProcW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
RegCreateKeyExW
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExA
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
OpenProcessToken
GetTokenInformation
ord680
ShellExecuteExW
ShellExecuteW
CoInitialize
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
VarUI4FromStr
SHGetValueW
PathRemoveFileSpecW
PathFileExistsW
InitCommonControlsEx
_crt_debugger_hook
__set_app_type
_controlfp_s
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
??3@YAXPAX@Z
memset
wcsrchr
_CxxThrowException
memcpy_s
__CxxFrameHandler3
??_V@YAXPAX@Z
_purecall
free
memmove_s
vswprintf_s
_recalloc
??2@YAPAXI@Z
wcsstr
malloc
wcsncpy_s
strncpy_s
iswdigit
_wtoi
wcslen
wcschr
_errno
_vsnwprintf
wcstok
strerror
wcsncpy
_snwprintf
_swprintf
swscanf
memcpy
_vsnprintf
exit
wcsncat
_except_handler4_common
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE