Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
1172674e9c518e9f75112b3727b531ad_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1172674e9c518e9f75112b3727b531ad_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
1172674e9c518e9f75112b3727b531ad_JaffaCakes118
Size
1.5MB
MD5
1172674e9c518e9f75112b3727b531ad
SHA1
da1ce1486a1ec24f6a95c7406a685ae69f2ef3bc
SHA256
6768595cfc2585e6ed61471f81a5a4d330de7d53358af988b6c1b1fb80c8f9cf
SHA512
49933d908aaee9507f5e613bbeac53704e834a5c1f3c9ec488d7744c08848452be74471509e8633d1664f3166c97cb9ac0c97d8704a613830bdcacb4aa901878
SSDEEP
24576:IrWrDDUnU1Npsl6eKVBjxYRIUBOXL1NB7upWCohSvyV4AupOH7jjmVaR/pNwVlvm:kWrDcA2kjxWOr7O2kwXOa2XkOWxW2xL/
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Elevated_MpMiniSigStub.pdb
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetCommandLineW
ExitProcess
HeapSetInformation
FindResourceW
FreeLibrary
LoadResource
CreateProcessW
HeapAlloc
GetSystemWindowsDirectoryW
HeapFree
CreateDirectoryW
WaitForSingleObject
GetProcessHeap
WriteFile
GetSystemDirectoryW
LoadLibraryW
SizeofResource
GetExitCodeProcess
CreateFileW
GetLastError
GetCurrentDirectoryW
GetProcAddress
LockResource
SetCurrentDirectoryW
RemoveDirectoryW
CloseHandle
DeleteFileW
SetFileAttributesW
RegSetValueExW
RegCloseKey
GetLengthSid
RegOpenKeyExW
FreeSid
IsValidSid
AddAccessAllowedAce
AllocateAndInitializeSid
InitializeAcl
RegDeleteValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExW
RegCreateKeyExW
CopySid
OpenProcessToken
GetTokenInformation
memset
DbgPrint
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ