Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
06045829466883358929bf982a842759_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
06045829466883358929bf982a842759_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
06045829466883358929bf982a842759_JaffaCakes118
Size
566KB
MD5
06045829466883358929bf982a842759
SHA1
dd30b6d8262ac01e37470459aab675bbf06ed483
SHA256
1219c8826a4d977c4e2a2801fac1aece277f02cfbd056fd88a9027f1884326c6
SHA512
9430427d3a76840bdd8813ec7248d7f82efb10e98b462f6ddf3200e76573a304a3fc4ca380a629a32eeced4e927079ae3320c7f00178cf809525a3822e2f6791
SSDEEP
12288:oORvY/FiyBZ+yGHvCmdiOlASLxMU+aawtCN7ZL8BY/yN:ydC5HvCmdvfphabNN6YaN
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FindClose
LoadLibraryExA
VirtualUnlock
LoadLibraryA
GetTickCount
VirtualFree
GetModuleHandleA
CreateThread
VirtualAlloc
VirtualLock
GetProcAddress
CreateEventW
TerminateProcess
GetThreadPriority
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
HeapSize
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
GetSystemInfo
LoadBitmapA
LoadIconW
GetDC
DestroyWindow
LoadCursorA
IsWindowVisible
ord165
send
recv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ