Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_294770bc9d9b19894e487e2b6d33bda6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_294770bc9d9b19894e487e2b6d33bda6.exe
Resource
win10v2004-20241007-en
Target
JaffaCakes118_294770bc9d9b19894e487e2b6d33bda6
Size
255KB
MD5
294770bc9d9b19894e487e2b6d33bda6
SHA1
d06b887b5f8f9055dbe39155af467668f2fed750
SHA256
13d4d124825fe2bdb74b53b3f1ea96d039baa6d817fcf46ae74a90b0ed718fe8
SHA512
64d5917d272b2005b951d1176c279f9ee570211d8d65155d778da9f6018aa1f19aa80d6501e401c787b3da3d8f800bf226ebde21513d4de6eeae679224f3082a
SSDEEP
3072:xiG47vmfhnT1unjf9tLEciSWEqF1R/plSaRCKj8Hn7z89NbgjZrTtM8M8Z1yuxZq:xi0J4H+rRZRxjc74DbgjNTiwr+
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcmpi
FatalAppExitW
GetCurrentDirectoryW
SetComputerNameW
GetLogicalDrives
LoadLibraryExA
GlobalFindAtomA
GetLogicalDriveStringsW
GetExitCodeProcess
CreateMailslotW
SetCurrentDirectoryW
lstrcpynA
TlsAlloc
DisconnectNamedPipe
GetShortPathNameA
FatalAppExitA
GetVersion
GetEnvironmentVariableA
GetProcAddress
EnumDateFormatsW
AddAtomW
QueryPerformanceCounter
FileTimeToDosDateTime
SearchPathW
CreateMutexW
GetEnvironmentStringsW
GetEnvironmentStringsA
GetCurrentProcessId
GetDiskFreeSpaceA
LoadCursorA
DialogBoxIndirectParamW
CharLowerA
RemoveMenu
UnregisterClassA
GetMenuState
DestroyIcon
CreateDialogIndirectParamW
AdjustWindowRect
SendDlgItemMessageW
IsIconic
GetCapture
mouse_event
SetDlgItemInt
RegisterClassA
GetMenuItemRect
DefWindowProcW
PeekMessageW
SetTimer
SetCapture
CreateDesktopW
GetActiveWindow
MessageBoxA
GetCapture
CopyIcon
GetSysColor
SetFocus
DialogBoxParamW
DialogBoxIndirectParamA
keybd_event
StretchDIBits
CreateScalableFontResourceA
CreateFontIndirectW
CreateRoundRectRgn
CreateBitmap
GetMetaFileA
CreateFontIndirectExW
CreateFontIndirectExA
GetTextExtentPointA
CryptContextAddRef
StrCmpNA
StrNCmpA
ShellExecuteExA
StrCmpNIA
StrRChrIA
ShellExecuteEx
FreeIconList
StrStrA
VarI8FromBool
VarDateFromUdate
VarEqv
VarUI4FromR8
CreateStdDispatch
CM_Modify_Res_Des_Ex
SetupDiCallClassInstaller
CMP_WaitNoPendingInstallEvents
CM_Open_Class_KeyA
SetupDiGetCustomDevicePropertyA
SetupInstallServicesFromInfSectionA
SetupDiGetClassDevsExA
SetupQueueCopyIndirectA
CM_Reenumerate_DevNode_Ex
MyMalloc
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ