Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4ac0c476330b28bff54703b4176011d0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4ac0c476330b28bff54703b4176011d0.exe
Resource
win10v2004-20241007-en
Target
JaffaCakes118_4ac0c476330b28bff54703b4176011d0
Size
235KB
MD5
4ac0c476330b28bff54703b4176011d0
SHA1
2123a25ae2c4fd6f92b5c6307701e102f4b1ad3a
SHA256
135988bdd11fc127c354e283af0fac5e908ab91a9939d01dd089da354c311a91
SHA512
0b3c7c101dbab5be1bcffb5f93c420f2faa69572a0a20a7f925ca822181854c0b280dc9527a47f6f1f7794fd858a4f97ea673d3b55f449e0419831aeb82e425e
SSDEEP
6144:UKP3AAe679MuCGA04izCqmseHPWditiXIKfftNo:UK4ZIMuf4iCBvn84K96
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IsBadCodePtr
GetProcessHeaps
IsBadWritePtr
lstrlenW
GetEnvironmentStringsW
DisconnectNamedPipe
FatalAppExitW
FatalAppExitA
GetLogicalDriveStringsW
InitializeCriticalSection
GetDiskFreeSpaceW
TlsAlloc
LoadLibraryA
GetSystemDirectoryA
BeginUpdateResourceW
SetUnhandledExceptionFilter
GetModuleHandleW
CopyFileExA
GetVolumeInformationW
GetLongPathNameA
SetCalendarInfoA
FindResourceW
ReplaceFileA
GetDateFormatW
GetEnvironmentVariableA
GetNumberFormatW
GetTempFileNameW
FindAtomW
GetVolumeInformationA
GetLogicalDrives
LocalFree
GetProcessHeap
GetACP
GetCurrentDirectoryA
MulDiv
GetUserDefaultLangID
GetLastError
GetLongPathNameW
EnumTimeFormatsA
EnumCalendarInfoW
CreateNamedPipeW
HeapCreate
GetLocaleInfoA
GetSystemDefaultLangID
FileTimeToSystemTime
LoadLibraryW
GetShortPathNameW
GetUserDefaultLCID
GetWindowsDirectoryA
GetThreadPriority
GetThreadLocale
GetTickCount
RemoveDirectoryW
GetTempFileNameA
GlobalAlloc
lstrcpynA
lstrcmpiW
GetTimeFormatA
lstrcmp
ReadDirectoryChangesW
OpenMutexW
GetFileAttributesW
GetShortPathNameA
CompareFileTime
EnumCalendarInfoA
EnumDateFormatsW
GetComputerNameA
GlobalGetAtomNameW
lstrcpyW
GetCurrentProcess
IsBadStringPtrA
OpenFile
GetLogicalDriveStringsA
GetVersionExA
MoveFileW
SystemTimeToFileTime
GetCalendarInfoA
GetProcAddress
GetOEMCP
SleepEx
SetErrorMode
FreeLibrary
SetCurrentDirectoryW
lstrcpyA
GetCalendarInfoW
lstrcpyn
SetEvent
RaiseException
GetWindowsDirectoryW
ReplaceFileW
SetCalendarInfoW
BeginUpdateResourceA
DuplicateHandle
lstrcmpiA
lstrcat
SetWindowPos
IsWindow
InsertMenuItemA
WinHelpW
EndDialog
CreateDialogIndirectParamA
SendDlgItemMessageW
wvsprintfW
GetCaretPos
MessageBeep
ShowWindow
ActivateKeyboardLayout
OpenClipboard
GetClassInfoExW
GetMessageW
EndMenu
ShowCursor
GetTopWindow
LoadImageA
SetDlgItemInt
ShowCaret
DialogBoxParamA
CharLowerW
DestroyIcon
PostMessageW
FindWindowA
mouse_event
DialogBoxParamW
SetForegroundWindow
CreateDialogIndirectParamW
CharNextA
GetMenuItemInfoW
DuplicateIcon
ShellExecuteExA
StrStrIW
SHBrowseForFolder
SHGetDiskFreeSpaceExA
SHGetFolderPathA
StrChrW
StrRChrIW
StrStrW
FreeIconList
SHGetDiskFreeSpaceA
ExtractAssociatedIconA
SHCreateDirectoryExW
CoDosDateTimeToFileTime
BindMoniker
CoGetClassObject
CreateFileMoniker
CoGetCurrentProcess
CoUninitialize
VarUI1FromDisp
SafeArrayCopy
VarBstrFromUI1
VarSub
VarImp
SafeArrayGetElement
RegisterActiveObject
glRasterPos2iv
glRenderMode
glTexCoord1sv
glGetPointerv
GlmfInitPlayback
glPixelMapuiv
glColor3bv
WSAGetLastError
WSASend
setsockopt
gethostbyname
CoInternetGetProtocolFlags
GetClassFileOrMime
CopyStgMedium
URLOpenStreamA
CoInternetParseUrl
CoInternetCompareUrl
CompareSecurityIds
URLDownloadToFileA
WriteHitLogging
HlinkSimpleNavigateToMoniker
GetComponentIDFromCLSSPEC
FindMediaTypeClass
CoInternetGetSession
SetSoftwareUpdateAdvertisementState
RegisterBindStatusCallback
TraceSQLError
TraceSQLGetData
WSAAsyncGetHostByAddr
GetTypeByNameA
WEP
rcmd
inet_network
WSASetBlockingHook
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ