Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
553c78ad54842779cfa0b52f7a014f7c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
553c78ad54842779cfa0b52f7a014f7c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
553c78ad54842779cfa0b52f7a014f7c_JaffaCakes118
Size
380KB
MD5
553c78ad54842779cfa0b52f7a014f7c
SHA1
4bcd343c3a009ba669c0c55954b2e9f41d80d7bc
SHA256
6d6b7033ba01632a5a26b70eb9cee4c234357d90ae1a70698dc6d7d4c115b65f
SHA512
00c59e6866afda50fbcce78361d64688d47f468aea704e0917923f65c8717c314b95ccf6e38bdbc5b8a8e9dda7cccd25dd2c47fae86a9c154936f442e52bab08
SSDEEP
6144:ZIpasPTvQ7Eqs3b7smSgAoPqqtNjrYrI3:Gk4bNA+hU
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\p4_p4serv1.online.ea.com1666_JLENNY-6020582\Core\ML\Core\CDKey\Image\code.pdb
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
CreateFileA
GlobalFlags
InterlockedIncrement
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetCPInfo
GetOEMCP
SetFilePointer
WritePrivateProfileStringA
SetErrorMode
HeapFree
RtlUnwind
VirtualAlloc
HeapAlloc
HeapReAlloc
RaiseException
GetCommandLineA
GetProcessHeap
GetStartupInfoA
ExitProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
Sleep
SetHandleCount
GetFileType
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
SetStdHandle
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
WriteFile
ReadFile
GetThreadLocale
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
CloseHandle
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
lstrcmpW
GetProcAddress
GetVersionExA
SetLastError
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetPrivateProfileStringW
GetCurrentDirectoryA
FindResourceExA
GetModuleHandleA
GetUserDefaultLangID
LoadResource
LockResource
SizeofResource
FindResourceA
GetLastError
lstrlenA
WideCharToMultiByte
CompareStringA
MultiByteToWideChar
GetVersion
InterlockedExchange
EndPaint
GetSysColorBrush
LoadCursorA
DestroyMenu
UnregisterClassA
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
BeginPaint
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
EnableWindow
MessageBoxA
GetWindowRect
GetWindow
GetMenuState
GetMenuItemID
ReleaseDC
GetDC
ClientToScreen
GrayStringA
LoadImageA
LoadIconA
SetActiveWindow
SetForegroundWindow
SendMessageA
PostMessageA
InvalidateRect
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowThreadProcessId
RemovePropA
EndDialog
GetNextDlgTabItem
GetParent
GetMenuItemCount
GetSubMenu
GetDesktopWindow
GetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
DeleteDC
GetStockObject
GetClipBox
SetTextColor
SetBkColor
GetObjectA
SaveDC
RestoreDC
DeleteObject
ScaleWindowExtEx
ExtTextOutA
SetWindowExtEx
CreateBitmap
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
GetDeviceCaps
TextOutA
RectVisible
PtVisible
Escape
RegQueryValueExA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
ord17
PathFindFileNameA
PathFileExistsW
PathFindExtensionA
LresultFromObject
CreateStdAccessibleObject
DocumentPropertiesA
OpenPrinterA
ClosePrinter
VariantInit
VariantChangeType
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE