Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
fcbc212ed485e2e411a94f2089bdc81e_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fcbc212ed485e2e411a94f2089bdc81e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Target
fcbc212ed485e2e411a94f2089bdc81e_JaffaCakes118
Size
318KB
MD5
fcbc212ed485e2e411a94f2089bdc81e
SHA1
a754eaadeb2bf9758cc986fdb3424b0493d722d2
SHA256
12b1ac6c952fd1bc7b6ec3111c265dc2f64aa06143cf24245458d5120572b202
SHA512
49c7fef57c76e27950eb495c29fe79e21409f9066285462fa13718b05f3ffd3dd427a40afc16211541bb755b71cbbbab3445d8e701a69871160c7166f7f8986f
SSDEEP
6144:CmzuLx62zqukIQ8eyXN1DML15UbzwYyhVbASzp2S5EagfuVOZ:Ylz+ukIQc5K5y/8VcmpDVOZ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
VerQueryValueW
InternetCloseHandle
InternetOpenA
HttpEndRequestA
TlsGetValue
GetTickCount
GetVersion
SetErrorMode
WriteFile
ExitProcess
VirtualAlloc
ReadFile
GetLastError
CreateFileMappingA
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetCurrentDirectoryW
GetCurrentProcess
GetOEMCP
GetCommandLineA
GetUserDefaultLangID
DeleteFileW
InterlockedDecrement
GetCurrentThreadId
SetStdHandle
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetStringTypeW
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetModuleHandleA
GetVersionExA
GetProcAddress
FlushFileBuffers
SetFilePointer
GetCPInfo
CloseHandle
GetACP
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
CreateThread
GetModuleFileNameA
UnhandledExceptionFilter
TerminateProcess
HeapFree
ShowWindow
RegisterClassExA
CreateWindowExA
GetSystemMetrics
SetEnhMetaFileBits
SetPixel
SetROP2
StretchBlt
UnrealizeObject
Rectangle
RegCreateKeyExA
AllocateAndInitializeSid
RegCloseKey
CoTaskMemAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ