Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
138fdc057edca329cc9a2c083cf1c2e2_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
138fdc057edca329cc9a2c083cf1c2e2_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
138fdc057edca329cc9a2c083cf1c2e2_JaffaCakes118
Size
318KB
MD5
138fdc057edca329cc9a2c083cf1c2e2
SHA1
bd1b8d3bcde73712f26499b847fc003c512f77bf
SHA256
0f20650a1b8bd6c76094928455474cd8386c518601b907017282ee63d80c3567
SHA512
60947ca5a4d5a2c06a4f8b1124ceb137236cb34a51cc3c0546d51bc49247ea570a0a24f3f9e8ec23beeb491673def88d7bb0183b98fe40dd72e8888910853424
SSDEEP
6144:XjbD00qzLj6QwFazhhNiS/All+e2jCaItgMKhKBSEhZ:zbYpP/wFa9XK2juvqqZ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
VerQueryValueW
GetCurrentThreadId
GetCommandLineW
GetSystemTimeAsFileTime
WriteFile
GetTickCount
ExitProcess
VirtualAlloc
ReadFile
lstrcmpiA
LockResource
GetLastError
CloseHandle
CreateFileMappingA
GetCurrentProcess
GetModuleHandleA
GetVersion
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetStringTypeW
GetEnvironmentVariableA
GetFileType
TlsGetValue
GetStartupInfoA
GetVersionExA
DeleteFileW
GetModuleHandleW
GetProcAddress
GetCommandLineA
LCMapStringW
GetStringTypeA
GetUserDefaultLangID
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
HeapFree
TerminateProcess
UnhandledExceptionFilter
GetModuleFileNameA
GetSystemMetrics
CreateWindowExA
EndPaint
RegisterClipboardFormatA
ShowWindow
RegisterClassExA
CreateDialogParamA
MessageBoxA
SetBkColor
Rectangle
GetUserNameA
AllocateAndInitializeSid
CoTaskMemAlloc
CoInitialize
SysAllocStringLen
SysReAllocStringLen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ