Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
be8056e6c13c7092a5bdfbb828f5647b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be8056e6c13c7092a5bdfbb828f5647b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
be8056e6c13c7092a5bdfbb828f5647b_JaffaCakes118
Size
2.9MB
MD5
be8056e6c13c7092a5bdfbb828f5647b
SHA1
efc9ead6c35460135808d72e2dfe4eaad973649c
SHA256
279f2c4d01228655d934891fdd07990ae7c928ef0e81a4e84108975e27fff075
SHA512
289a908305a66d114249da7f2910734bbf0f13cb72915b3462dc5bc6f7449f1f46343e6b83e7662a8d417363e349b38a7dae19233cf117b814ecb0e7844aa8e4
SSDEEP
49152:LM0fZaQO7U+hLBQM0fZaQO7U+hLbBQM0fZaQO7U+h:LM0fZaQOhgM0fZaQOhEM0fZaQOh
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\a\1\b\bin\win32\pyw.pdb
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegQueryValueExW
SHGetFolderPathW
WriteConsoleW
SetEndOfFile
EnterCriticalSection
HeapReAlloc
HeapSize
CreateFileW
GetStartupInfoW
SetConsoleCtrlHandler
SetInformationJobObject
QueryInformationJobObject
SearchPathW
GetBinaryTypeW
GetCommandLineW
GetCurrentProcess
GetStdHandle
AssignProcessToJobObject
GetModuleFileNameW
SetEnvironmentVariableW
CreateJobObjectW
GetEnvironmentVariableW
GetFileAttributesW
DuplicateHandle
MultiByteToWideChar
GetPrivateProfileStringW
FormatMessageW
GetLastError
WaitForSingleObjectEx
CloseHandle
CreateProcessW
IsWow64Process
GetExitCodeProcess
SetFilePointerEx
GetFileSizeEx
GetProcessHeap
SetStdHandle
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
SetLastError
DecodePointer
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
ExitProcess
GetModuleHandleExW
GetCommandLineA
WriteFile
HeapFree
HeapAlloc
GetCurrentThread
GetFileType
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetStringTypeW
ReadFile
ReadConsoleW
OutputDebugStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
MessageBoxW
PostMessageW
GetMessageW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ