Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
129e5deb2095037158eb14d3bb417e25_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
129e5deb2095037158eb14d3bb417e25_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
129e5deb2095037158eb14d3bb417e25_JaffaCakes118
Size
284KB
MD5
129e5deb2095037158eb14d3bb417e25
SHA1
e67b5c8be4aee2fb90781e8290abb9651de76c8e
SHA256
2081577133dc6e2fd740bb03a9ac66ad290e4753d63f61ee273654c752413e35
SHA512
b47318b592d08de0e3b6da69722f94429025cfcb0ccaaf093d7f3e790ad1215d186362f188f9185c2001ac5876a5d94d96e721fb6ca8658ed8886780ae0563ab
SSDEEP
3072:Ww3Qxx7/ivTiG4mWAwLcvqEJkCKSLEuZs5c17hr2E7qlifV9JoJ5cUUDIo:fa7K75WAwkdzFZhqE7qY9o5VUDR
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileMappingW
MapViewOfFileEx
HeapAlloc
GetCommandLineA
EncodePointer
DecodePointer
GetLastError
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
GetStdHandle
WriteFile
GetModuleFileNameW
GetProcessHeap
SetLastError
InterlockedIncrement
GetCurrentThreadId
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
Sleep
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringW
LoadLibraryW
RtlUnwind
HeapSize
HeapReAlloc
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ