Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
c694e13e106916477306a125bcd67e64_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c694e13e106916477306a125bcd67e64_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
c694e13e106916477306a125bcd67e64_JaffaCakes118
Size
2.8MB
MD5
c694e13e106916477306a125bcd67e64
SHA1
8437a1af9851441eff90ad1177f21a476e751864
SHA256
8f5634b6a7bd65dab251dc4495836f7dc42de1e156458d534767e9b1ee93ca1b
SHA512
b149a777053cb3cc3ce21bd508f7688b4b2d360869b5157b698eaee058f2f6cd8c97c971686f22bff5ad6cc36047655a5a4f464c0f5c6beacf1c0acc345d83e1
SSDEEP
24576:14WA3KEi+1r0fZcaYM8Bx4tSVuUXG4fM+hGb4WA3KEi+1r0fZcaYM8Bx4tSVuUXK:LM0fZaQO7U+hGM0fZaQO7U+h
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\a\1\b\bin\win32\pyw.pdb
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegQueryValueExW
SHGetFolderPathW
WriteConsoleW
SetEndOfFile
EnterCriticalSection
HeapReAlloc
HeapSize
CreateFileW
GetStartupInfoW
SetConsoleCtrlHandler
SetInformationJobObject
QueryInformationJobObject
SearchPathW
GetBinaryTypeW
GetCommandLineW
GetCurrentProcess
GetStdHandle
AssignProcessToJobObject
GetModuleFileNameW
SetEnvironmentVariableW
CreateJobObjectW
GetEnvironmentVariableW
GetFileAttributesW
DuplicateHandle
MultiByteToWideChar
GetPrivateProfileStringW
FormatMessageW
GetLastError
WaitForSingleObjectEx
CloseHandle
CreateProcessW
IsWow64Process
GetExitCodeProcess
SetFilePointerEx
GetFileSizeEx
GetProcessHeap
SetStdHandle
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
SetLastError
DecodePointer
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
ExitProcess
GetModuleHandleExW
GetCommandLineA
WriteFile
HeapFree
HeapAlloc
GetCurrentThread
GetFileType
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetStringTypeW
ReadFile
ReadConsoleW
OutputDebugStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
MessageBoxW
PostMessageW
GetMessageW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ