Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
33bf336b38020596748befafa50e433f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
33bf336b38020596748befafa50e433f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
33bf336b38020596748befafa50e433f_JaffaCakes118
Size
373KB
MD5
33bf336b38020596748befafa50e433f
SHA1
69e3a64cf7874e689ef6f5f1cde9906aa3c54e95
SHA256
ffb296ef5eedbbb62721a7988793f32b6833f9a22885ca97a210818f00bc1bb9
SHA512
2b0d255e67438ac9978c47ba03cb65c10b60724ce60c3142d587633762b38d9e98b1bec587000c7f1cf353dd4a118f6df195e1eb20ca77b105f09d4a38f9a29f
SSDEEP
6144:SMb96WRebPrj5N+9MUY+qbo+n9dn0lmVIp9yfbrRS/qE32TEiOhI/o:SMb961bPr1jaqb9dn0YyDarRKkIlI/o
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameW
LoadLibraryA
CloseHandle
WriteConsoleW
HeapAlloc
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineW
GetLastError
InterlockedDecrement
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
GetStdHandle
WriteFile
GetProcessHeap
HeapSize
Sleep
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
GetCurrentThreadId
RaiseException
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
EnterCriticalSection
LeaveCriticalSection
LoadLibraryExW
OutputDebugStringW
LoadLibraryW
HeapReAlloc
RtlUnwind
GetStringTypeW
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
CreateFileW
ShellExecuteW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ