Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
fb53443b9ed192c4c4dde6500758ad8d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb53443b9ed192c4c4dde6500758ad8d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
fb53443b9ed192c4c4dde6500758ad8d_JaffaCakes118
Size
27KB
MD5
fb53443b9ed192c4c4dde6500758ad8d
SHA1
4ffb6682cd477e6d536a058cac5d65382ae65295
SHA256
6f250024679e9a839785c1a91c297f091f3bf0976d8ede0ad9273087653393d4
SHA512
2eecdff686ae7156ca0b72e8dabe90109ad98432b7bfaca4220842c91104739c300f2341c1f00389dd3906f5d9fd86651c62be6c803d8b605d66cbebb37144b3
SSDEEP
384:yJn79ZdgRwQIxiigtdmlJdorTWiRrvrCyySJjU7RwgloREx:yJnojigNBrOypJWRwgloR
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
GetModuleHandleA
WriteFile
ReadFile
DeleteFileA
CloseHandle
GetFileSize
CreateFileA
CreateThread
CopyFileA
GetStringTypeA
LCMapStringW
LCMapStringA
ExitProcess
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
CreateDirectoryA
GetWindowsDirectoryA
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
WinExec
Sleep
GetLastError
GetCPInfo
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetStringTypeW
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
MultiByteToWideChar
HeapReAlloc
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
IsChild
wsprintfA
IsWindowVisible
IsZoomed
DispatchMessageA
TranslateMessage
GetMessageA
RegDeleteKeyA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
recvfrom
sendto
connect
WSAStartup
htons
ioctlsocket
socket
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ