Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
sampfuncs-4284b8bd-c9fd0.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
sampfuncs-4284b8bd-c9fd0.exe
Resource
win10v2004-20240412-en
Target
f169a9c0a6caccd13eb11afa589f4a25_JaffaCakes118
Size
3.6MB
MD5
f169a9c0a6caccd13eb11afa589f4a25
SHA1
9b116c820b50f8ad2ef13a7adeb17a19ef6b9e8f
SHA256
028dfe83396e3f8d37c3510a3b246967661ed2e35444c7bf66c6f4668aa1b6aa
SHA512
b87997fcb2dbe1eaeac8c0b1b2effeb5dc51caecdd079ff85e59a7581c41dbf5111e1ed69762cdae14426b05e50514afbcab36c7efc87fb98fafd87f4c526a1d
SSDEEP
98304:WWxLzx58PyyUSOoVeEPDkIYM5/F4vTRnQ3D7PBG3:WqLzx58Py5
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
FindNextFileA
FindNextFileW
FindAtomW
FreeConsole
EnumResourceTypesA
FormatMessageA
FoldStringA
FlushViewOfFile
CreateMutexA
FlushInstructionCache
FindFirstFileW
FindFirstFileA
GetVersion
GetCommandLineA
GetLastError
GetOEMCP
GetACP
FreeLibrary
LoadLibraryW
GetModuleHandleW
ExitProcess
DeviceIoControl
CreateFileA
LCMapStringA
GetStringTypeW
GetStringTypeA
DuplicateHandle
LoadLibraryA
HeapReAlloc
VirtualAlloc
HeapAlloc
GetCPInfo
WriteFile
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
LCMapStringW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetProcAddress
GetStartupInfoA
GetModuleHandleA
RtlUnwind
FileTimeToSystemTime
FindAtomA
FileTimeToDosDateTime
VirtualProtect
RemoveDirectoryA
FileTimeToLocalFileTime
GetBinaryTypeA
FreeLibraryAndExitThread
GetBinaryTypeW
FormatMessageW
DisconnectNamedPipe
FlushFileBuffers
GetAtomNameA
EnumSystemCodePagesA
GetAtomNameW
GenerateConsoleCtrlEvent
FlushConsoleInputBuffer
FreeResource
CreateFileMappingA
FoldStringW
OpenProcess
AddAtomW
AddAtomA
GetTickCount
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
LoadLibraryExW
GetModuleFileNameA
MultiByteToWideChar
GetVersionExA
MessageBoxA
GetSystemMetrics
DestroyIcon
SetCursor
GetSysColor
DefWindowProcA
DlgDirListComboBoxW
GetParent
DefFrameProcA
DialogBoxParamA
LoadStringA
DispatchMessageA
SetWindowLongA
TranslateMessage
DeferWindowPos
DlgDirListW
TrackPopupMenu
DestroyWindow
DialogBoxParamW
GetClassNameA
DestroyCaret
DlgDirSelectComboBoxExA
DlgDirSelectExA
DestroyCursor
IsWindowEnabled
DlgDirListA
DlgDirSelectExW
DispatchMessageW
GetClientRect
DlgDirListComboBoxA
DragDetect
DragObject
GetWindowDC
ReleaseDC
DestroyMenu
RegEnumValueW
LookupAccountNameW
CreateServiceA
AddAccessDeniedAce
CopySid
LookupPrivilegeNameA
AddAce
RegDeleteValueW
AreAllAccessesGranted
CreatePrivateObjectSecurity
DestroyPrivateObjectSecurity
RegCreateKeyExA
CreateProcessAsUserW
RegDeleteKeyA
AddAccessAllowedAce
RegEnumValueA
RegCloseKey
EqualSid
CreateRestrictedToken
RegQueryValueExA
InitializeSid
CreateProcessAsUserA
IsValidSid
DeregisterEventSource
DuplicateToken
CreateServiceW
RegQueryValueW
AllocateLocallyUniqueId
ClearEventLogW
OpenEventLogW
RegOpenKeyExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ