Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
fae8a465cc5a2aa5b436947559f62937_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fae8a465cc5a2aa5b436947559f62937_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Target
fae8a465cc5a2aa5b436947559f62937_JaffaCakes118
Size
1.8MB
MD5
fae8a465cc5a2aa5b436947559f62937
SHA1
d3fa9043dd15df440f33be3e18891f122d397094
SHA256
862a3ffe3832e057fd53dbf89cf02d90bbbceb522dba7e81bf71ee16fd648b3d
SHA512
49a701109f07dfda38231a9dab544506bf6292849a3913815c476cbf0543b2b2f94d6bb022758f6f17c7502e4102f3ccfd1b0a7d083a8e9e3d919417a2f31260
SSDEEP
49152:SAbCfOjPWceAFAlq9AESdfJuVzpo8cEaL3dUnFJ6lNEb:SJltfuzt8CFJjb
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\f\save\bin\client\master\five\release\dbg\CitizenFX_SubProcess_game_mtl.pdb
GetLastError
AddVectoredExceptionHandler
GetCurrentProcessId
ExitProcess
GetStartupInfoW
VirtualProtect
CreateFileMappingW
MapViewOfFile
GetModuleFileNameW
GetModuleHandleW
LoadLibraryA
K32EnumProcessModules
CreateDirectoryW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
CreateMutexW
OpenMutexW
CreateThread
GetCurrentThread
GetCurrentThreadId
GetSystemTime
GetTickCount64
LocalFree
SystemTimeToFileTime
VerSetConditionMask
CloseHandle
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
GetFileAttributesW
RtlAddFunctionTable
GetModuleFileNameA
DeleteFileW
GetFullPathNameW
CreateProcessW
GetSystemTimeAsFileTime
CopyFileW
GetEnvironmentVariableW
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetEvent
WaitForSingleObject
CreateEventW
GetExitCodeProcess
OpenProcess
GetSystemDirectoryW
IsProcessInJob
CreateJobObjectW
AssignProcessToJobObject
SetInformationJobObject
GetPrivateProfileIntW
SetDllDirectoryW
MoveFileW
FindClose
FindFirstFileW
FindNextFileW
FreeLibrary
CreateFileW
GetCommandLineW
LoadLibraryW
HeapSize
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetProcAddress
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetFileAttributesExW
VerifyVersionInfoW
GetOEMCP
GetACP
HeapReAlloc
GetTimeZoneInformation
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileSizeEx
GetConsoleCP
HeapAlloc
ReadConsoleW
GetConsoleMode
HeapFree
SetStdHandle
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
WriteConsoleW
GetPrivateProfileStringW
OutputDebugStringA
InitializeCriticalSectionAndSpinCount
WriteFile
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
ResetEvent
WaitForMultipleObjects
SetUnhandledExceptionFilter
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ReleaseSemaphore
CreateSemaphoreW
GetProcessId
VirtualQueryEx
FormatMessageA
WideCharToMultiByte
CreateEventA
WaitForSingleObjectEx
FoldStringW
LCMapStringW
CompareStringW
GetDateFormatW
GetTimeFormatW
GetLocaleInfoW
GetCurrencyFormatW
GetLocaleInfoA
EnumSystemLocalesA
MultiByteToWideChar
IsValidCodePage
IsDBCSLeadByteEx
GetStdHandle
GetFileType
FindFirstFileExW
GetFileInformationByHandle
RemoveDirectoryW
SetEndOfFile
SetFilePointerEx
AreFileApisANSI
SetLastError
MoveFileExW
GetExitCodeThread
GetStringTypeW
EncodePointer
DecodePointer
QueryPerformanceCounter
GetCPInfo
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
RaiseException
OutputDebugStringW
GetThreadTimes
FreeLibraryAndExitThread
LoadLibraryExW
InterlockedFlushSList
RtlPcToFileHeader
RtlUnwindEx
GetModuleHandleExW
ReadFile
ExitThread
GetDriveTypeW
PeekNamedPipe
RtlUnwind
FindWindowW
MessageBoxW
MsgWaitForMultipleObjects
TranslateMessage
DispatchMessageW
PeekMessageW
RegGetValueW
GetTokenInformation
OpenProcessToken
RegSetKeyValueW
CommandLineToArgvW
SetCurrentProcessExplicitAppUserModelID
SHSetLocalizedName
ord709
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
AmdPowerXpressRequestHighPerformance
AsyncTrace
BeforeTerminateHandler
DllCanUnloadNow
EarlyInitializeExceptionHandler
GetErrorData
InitializeExceptionHandler
NvOptimusEnablement
RemoteExceptionFunc
TerminateForException
free
malloc
realloc
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ