Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
f9b81a9a5a4c55f8988cca09f9389f24_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f9b81a9a5a4c55f8988cca09f9389f24_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Target
f9b81a9a5a4c55f8988cca09f9389f24_JaffaCakes118
Size
240KB
MD5
f9b81a9a5a4c55f8988cca09f9389f24
SHA1
ad8fce6fa7ab836beec85de429cff4f97723a66a
SHA256
5c2ec8da2f02a7ef03d82c7afdece10558d5da4cdeb4ca259773709c5926e00e
SHA512
8c332702f8462cf4295194c849f858a21cf872812fce49f202623c6749a969d7339816a1745a56e3afb2d6c2aff07c35d107570cb2d2190a5382cee0613d82eb
SSDEEP
6144:udkzyL3keSTR/G0aTBq/EnpsJHninW358L3KG:ugyL3k9pG5Ts/jhninW353G
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VerQueryValueA
GetWindowsDirectoryA
MoveFileExA
LocalAlloc
lstrlenA
FormatMessageA
SizeofResource
LockResource
LoadResource
FindResourceA
GetModuleHandleA
DeleteFileA
WritePrivateProfileStringA
CloseHandle
GetTickCount
WaitForMultipleObjects
FreeLibrary
GetProcAddress
LoadLibraryA
GetTempFileNameA
GetTempPathA
CreateEventA
OpenProcess
GetCurrentProcessId
GetModuleFileNameA
GetLastError
GetVersionExA
LocalFree
Sleep
UnmapViewOfFile
GetComputerNameA
MapViewOfFile
CreateFileMappingA
Process32Next
Process32First
CreateToolhelp32Snapshot
WriteFile
SetFilePointer
CreateFileA
GetLocalTime
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
InterlockedExchange
HeapFree
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
GetTimeFormatA
GetDateFormatA
HeapAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
FlushFileBuffers
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
VirtualQuery
GetTimeZoneInformation
VirtualProtect
GetSystemInfo
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
HeapSize
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
SetStdHandle
ReadFile
GetLocaleInfoW
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
InitializeAcl
RegOpenKeyExA
RegSetValueExA
SetSecurityInfo
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ