Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20241023-en
Target
JaffaCakes118_791661fa93116cdaab35d2beb8880f8f3ca02a586bd433c97264f8fff305dc3a
Size
1.7MB
MD5
50acd47b8e42d1bad8591396d138b640
SHA1
941437a23e445b2ee65ea0e6068d6d0156ac2821
SHA256
791661fa93116cdaab35d2beb8880f8f3ca02a586bd433c97264f8fff305dc3a
SHA512
c5c33044ad415e557e90b362927158affedf6691a0a83bc28ebfaee3a6bdd1c5515e8c28bf65a895b815cda961f49f29d6764c2414521d6c3cac5bfaab613f30
SSDEEP
49152:X2d4gwaj5ea42JdGwgkYoqF7bfdJI0eoC9HZZfft51Mvs7h:XW4gwate4nAoqjqN55iv2h
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord17
SHGetSpecialFolderPathW
ShellExecuteW
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteExW
CreateCompatibleDC
CreateFontIndirectW
DeleteObject
DeleteDC
GetCurrentObject
StretchBlt
GetDeviceCaps
CreateCompatibleBitmap
SelectObject
SetStretchBltMode
GetObjectW
FreeSid
AllocateAndInitializeSid
CheckTokenMembership
CreateWindowExW
GetDesktopWindow
wsprintfA
SetWindowPos
SetTimer
GetMessageW
ScreenToClient
KillTimer
CharUpperW
SendMessageW
EndDialog
wsprintfW
MessageBoxW
GetParent
CopyImage
ReleaseDC
GetWindowDC
GetMenu
GetWindowLongW
DispatchMessageW
GetWindowTextW
GetWindowTextLengthW
SetWindowTextW
GetSysColor
DestroyWindow
MessageBoxA
BringWindowToTop
ShowWindow
GetKeyState
GetDlgItem
GetClientRect
SetWindowLongW
UnhookWindowsHookEx
SetFocus
GetSystemMetrics
SystemParametersInfoW
DrawTextW
GetDC
ClientToScreen
GetWindow
DialogBoxIndirectParamW
DrawIconEx
CallWindowProcW
DefWindowProcW
CallNextHookEx
PtInRect
SetWindowsHookExW
LoadImageW
LoadIconW
MessageBeep
EnableWindow
IsWindow
EnableMenuItem
GetSystemMenu
CreateWindowExA
wvsprintfW
GetClassNameA
GetWindowRect
CreateStreamOnHGlobal
CoCreateInstance
CoInitialize
SysAllocStringLen
VariantClear
SysFreeString
OleLoadPicture
SysAllocString
SetFileTime
SetEndOfFile
GetFileInformationByHandle
VirtualFree
GetModuleHandleA
WaitForMultipleObjects
VirtualAlloc
ReadFile
SetFilePointer
GetFileSize
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
FormatMessageW
lstrcpyW
LocalFree
IsBadReadPtr
SuspendThread
TerminateThread
GetSystemDirectoryW
GetCurrentThreadId
InitializeCriticalSection
ResetEvent
SetEvent
CreateEventW
GetVersionExW
GetModuleFileNameW
GetCurrentProcess
SetProcessWorkingSetSize
GetDriveTypeW
CreateFileW
SetEnvironmentVariableW
GetTempPathW
GetCommandLineW
GetStartupInfoW
CreateProcessW
CreateJobObjectW
ResumeThread
AssignProcessToJobObject
CreateIoCompletionPort
SetInformationJobObject
GetQueuedCompletionStatus
GetExitCodeProcess
CloseHandle
LoadLibraryA
SetThreadLocale
lstrlenW
GetSystemTimeAsFileTime
ExpandEnvironmentStringsW
CompareFileTime
WideCharToMultiByte
FindFirstFileW
lstrcmpW
DeleteFileW
FindNextFileW
FindClose
SetCurrentDirectoryW
RemoveDirectoryW
GetEnvironmentVariableW
lstrcmpiW
GetLocaleInfoW
MultiByteToWideChar
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetSystemDefaultLCID
lstrcmpiA
GlobalAlloc
GlobalFree
MulDiv
FindResourceExA
SizeofResource
LoadResource
LockResource
GetProcAddress
GetModuleHandleW
GetStdHandle
ExitProcess
lstrcatW
GetDiskFreeSpaceExW
SetLastError
SetFileAttributesW
Sleep
GetExitCodeThread
WaitForSingleObject
CreateThread
GetLastError
SystemTimeToFileTime
GetLocalTime
GetFileAttributesW
CreateDirectoryW
lstrlenA
WriteFile
GetStartupInfoA
_purecall
memcmp
??2@YAPAXI@Z
memmove
memcpy
_wtol
strncpy
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
malloc
free
wcsstr
_CxxThrowException
wcscmp
_beginthreadex
_EH_prolog
?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
memset
_wcsnicmp
strncmp
wcsncmp
wcsncpy
??3@YAXPAX@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ