Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
35c391dcb68910224a55b7a3c25f0ea1_JaffaCakes118.exe
Resource
win7-20240508-en
Target
35c391dcb68910224a55b7a3c25f0ea1_JaffaCakes118
Size
112KB
MD5
35c391dcb68910224a55b7a3c25f0ea1
SHA1
7b0076e7504dd4394055f1a306d00c40dcfc2d8a
SHA256
1668d9353e0af593bfaa476396fa4d8ff8c22649e6959a30ab5e4f1d3b1babc0
SHA512
57397399813e2b6da473bd6dfa699d415981a59f339d74412e4a5c983206097d7f241070be20307e7a02f09b1ea0e1e1c7fa0da52eff1edf81225cfb33443480
SSDEEP
1536:esyXwRbvdYGx+RSoDNyX05rlwXAg6DND9y3pKx8l9YyhD0OqMs:esRRbV7x+RSoIX0Mwgu4K49YyhD0OqMs
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_itoa
memcpy
GetDesktopWindow
GetWindow
GetWindowRect
CopyRect
GetDlgCtrlID
GetCurrentProcess
ExitProcess
GetBinaryTypeA
GetModuleFileNameA
GetModuleHandleA
VirtualQuery
ReadProcessMemory
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE