Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
0256daf6d7476e268cac6fe0906db8f2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0256daf6d7476e268cac6fe0906db8f2_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
0256daf6d7476e268cac6fe0906db8f2_JaffaCakes118
Size
6.9MB
MD5
0256daf6d7476e268cac6fe0906db8f2
SHA1
ff9f374b091078b3d0b66d543f2390a9569eb081
SHA256
9948e7c5bf66b4a330903f3b90d46d0c84bdf9bbdd953a38d2cf4256ae65ddb4
SHA512
4d7f5cf5eda9de8120bb2b250141649f914a638284380c21ea58226ccbce7326c19bd7fc46186e70fcd63dcfcc45275e15cf2458dc5e1e98443ad0b619c34ab5
SSDEEP
98304:gp70raeK1JaTSFzX+ohIHVruP3WpF3UdE1hZHEdkFT:yHaTIhgJuP32+dmhZkaT
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
D:\DCB\CBT_Main\BuildResults\bin\Release\AcroCEF\AcroCEF.pdb
DuplicateHandle
GetFileType
SetHandleInformation
RegisterWaitForSingleObject
UnregisterWaitEx
AssignProcessToJobObject
WriteProcessMemory
CreateFileMappingW
MapViewOfFile
VirtualFree
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
GetFileAttributesW
QueryDosDeviceW
GetLongPathNameW
CreateFileW
VirtualProtectEx
ReadProcessMemory
GetCurrentDirectoryW
GetModuleFileNameW
GetLocalTime
OutputDebugStringA
WriteFile
FormatMessageA
LoadLibraryExW
LoadLibraryW
FreeLibrary
ReleaseSRWLockExclusive
VirtualFreeEx
CreateNamedPipeW
CreateProcessW
CreateRemoteThread
CreateJobObjectW
UnmapViewOfFile
FindResourceW
SizeofResource
LoadResource
LockResource
CreateDirectoryW
GetTempPathW
ReadFile
TlsGetValue
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
QueryThreadCycleTime
VirtualAlloc
SetThreadPriority
GetProcessTimes
SearchPathW
lstrlenW
DebugBreak
GetModuleHandleExW
SetFilePointerEx
SetEndOfFile
FlushFileBuffers
FindClose
FindNextFileW
FindFirstFileExW
SetUnhandledExceptionFilter
RtlCaptureStackBackTrace
TlsAlloc
TlsFree
TlsSetValue
VirtualQuery
WideCharToMultiByte
K32QueryWorkingSetEx
SwitchToThread
QueryDepthSList
InterlockedPopEntrySList
ReleaseSemaphore
GetThreadTimes
UnregisterWait
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
CreateTimerQueue
FreeLibraryAndExitThread
ExitThread
GetExitCodeThread
AreFileApisANSI
DeviceIoControl
TryEnterCriticalSection
CreateEventA
CancelIoEx
DisconnectNamedPipe
GetThreadId
RaiseException
IsDebuggerPresent
Sleep
ProcessIdToSessionId
GetCurrentProcessId
LocalFree
GetNativeSystemInfo
GetVersionExW
GetTickCount
EnumSystemLocalesEx
GetUserDefaultLocaleName
GetUserDefaultLCID
GetUserDefaultLangID
TerminateProcess
GetCurrentThreadId
SetInformationJobObject
DeleteCriticalSection
WaitForSingleObject
PostQueuedCompletionStatus
SetEvent
TerminateJobObject
LeaveCriticalSection
EnterCriticalSection
GetQueuedCompletionStatus
ResetEvent
SetLastError
CreateThread
CreateEventW
CreateIoCompletionPort
InitializeCriticalSection
VirtualAllocEx
VirtualQueryEx
GetCurrentThread
GetModuleHandleA
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
HeapCreate
GetSystemInfo
VerifyVersionInfoW
SetDllDirectoryW
GetProcAddress
GetModuleHandleW
GetCurrentProcess
CreateMutexW
ReleaseMutex
HeapSetInformation
GetProcessHeap
GetLastError
CloseHandle
GetCommandLineW
GetThreadPriority
ConnectNamedPipe
CancelSynchronousIo
VerSetConditionMask
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
OutputDebugStringW
ReadConsoleW
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
GetTimeFormatW
GetDateFormatW
VirtualProtect
LoadLibraryExA
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
LocalAlloc
TerminateThread
CreateFileMappingA
MapViewOfFileEx
OpenFileMappingA
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
WaitForSingleObjectEx
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetStartupInfoW
InitializeSListHead
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetConsoleCP
GetConsoleMode
ExitProcess
SetStdHandle
GetStdHandle
WriteConsoleW
GetSystemMetrics
CreateWindowStationW
GetProcessWindowStation
CloseWindowStation
CloseDesktop
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetUserObjectInformationW
GetUserNameW
EventWrite
EventUnregister
EventRegister
GetSidSubAuthorityCount
SetEntriesInAclW
GetSecurityInfo
GetSidSubAuthority
InitializeSid
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
DuplicateToken
CreateRestrictedToken
RegQueryValueExW
RegCreateKeyExW
SetThreadToken
GetTokenInformation
CreateProcessAsUserW
AccessCheck
EqualSid
IsValidSid
GetNamedSecurityInfoW
MapGenericMask
ImpersonateLoggedOnUser
FreeSid
SystemFunction036
ConvertSidToStringSidW
DuplicateTokenEx
GetKernelObjectSecurity
SetKernelObjectSecurity
GetAce
OpenProcessToken
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyExW
RegDisablePredefinedCache
RevertToSelf
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
SHGetFolderPathW
CommandLineToArgvW
SHGetKnownFolderPath
CoTaskMemFree
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ