Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageKeyEncipherment
Static task
static1
Behavioral task
behavioral1
Sample
2093388c036e19506cb45b8a7e040d4d_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2093388c036e19506cb45b8a7e040d4d_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Target
2093388c036e19506cb45b8a7e040d4d_JaffaCakes118
Size
2.4MB
MD5
2093388c036e19506cb45b8a7e040d4d
SHA1
65074a2145344253ebb2ec898ef5c4245112a9d1
SHA256
04e1dc0a91a6328dd6456b363e381edb56f838df7f6b412360c608e0fc07ff5e
SHA512
4f42f8d1916038f741bd8d27b74e103d80684201528aa2e3a46a38d467b1d34c01d5273aa671355a887e1008ea3ff99a0fb620f55a8d2e8774760f63f8b7ed7e
SSDEEP
12288:+Sf8F0C4U3g1ObUD09IbiaaZx4MiXlVdeS:+fF0zUQ1MUUZKM2lVdeS
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageKeyEncipherment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentDirectoryW
GetCurrentProcessId
ExitProcess
GetProcAddress
GetCurrentThreadId
WriteFile
LoadLibraryA
GetCommandLineA
HeapAlloc
GetLastError
SetLastError
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
GetModuleHandleExW
MultiByteToWideChar
GetStdHandle
GetModuleFileNameW
GetProcessHeap
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
IsDebuggerPresent
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
HeapFree
Sleep
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LoadLibraryExW
OutputDebugStringW
LoadLibraryW
RtlUnwind
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
OpenProcessToken
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ