Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
13624d5d7cc6e1d5c07ece6db95c5da3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13624d5d7cc6e1d5c07ece6db95c5da3_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
13624d5d7cc6e1d5c07ece6db95c5da3_JaffaCakes118
Size
103KB
MD5
13624d5d7cc6e1d5c07ece6db95c5da3
SHA1
13ab76b1140a43d933a0e77f108ac74825f43fe4
SHA256
13481008aa5c4241addcab5224ecd158de13470d35d5ca31d56712acc51ae898
SHA512
9897233ef6b8e04f9cbf49036bbd1394cc19506c867daf9b4bc0c027d54b10f1a796f4eb2250b1f0d10f28dfe438056104579b4840eba4c10b60e984412e30f8
SSDEEP
1536:AGA93w4GuJIOZ7qUVzUoI61ZlcVA/sWjcdhda3aI7:A33lCazZhkdhk3aI
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LockResource
OpenThread
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
LoadResource
SizeofResource
FindClose
GetTickCount
GetMailslotInfo
GetModuleHandleA
FindResourceW
FindResourceExW
FindFirstFileA
WideCharToMultiByte
EncodePointer
DecodePointer
RaiseException
RtlUnwind
AreFileApisANSI
MultiByteToWideChar
GetSystemTimeAsFileTime
GetCommandLineA
GetStdHandle
WriteFile
GetModuleFileNameW
IsProcessorFeaturePresent
HeapAlloc
HeapFree
InterlockedDecrement
ExitProcess
GetModuleHandleExW
HeapSize
Sleep
IsDebuggerPresent
SetLastError
InterlockedIncrement
GetCurrentThreadId
MoveFileExW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
LoadLibraryA
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetProcessHeap
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
LoadLibraryExW
LoadLibraryW
LCMapStringW
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointerEx
GetStringTypeW
FlushFileBuffers
SetStdHandle
WriteConsoleW
CloseHandle
CreateFileW
HeapDestroy
DeleteCriticalSection
InitializeCriticalSection
TerminateProcess
GetProcAddress
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ