Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
3b724573d6e75ed2112bfce00d268956_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b724573d6e75ed2112bfce00d268956_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
3b724573d6e75ed2112bfce00d268956_JaffaCakes118
Size
363KB
MD5
3b724573d6e75ed2112bfce00d268956
SHA1
81c129ea5faa70c35cfa5981e1492276220e077c
SHA256
7c9a002a03135fc3f40d20900ec57c7edc860ecc5b1f35606a3d73ca0cbb0e88
SHA512
670a3d6f78ca4ee92a2a7c34dbdc80be85835ef3a283c886ec74f6c445434b74373f52835221b2bbffe078d8296c3b6a32ab806286d821c5cccdc2200dfeaaf6
SSDEEP
6144:NkKx5bJWmAPc3KF6MCpj95tnCEeDDAEXaTr4JiDtqFNvpl5MUzbTI6Wh2yK96q:NrX9W7k3fMCt9jCT/PKTkJitqPdtzbTH
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Elevated_MpMiniSigStub.pdb
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetCommandLineW
ExitProcess
HeapSetInformation
FindResourceW
FreeLibrary
LoadResource
CreateProcessW
HeapAlloc
GetSystemWindowsDirectoryW
HeapFree
CreateDirectoryW
WaitForSingleObject
GetProcessHeap
WriteFile
GetSystemDirectoryW
LoadLibraryW
SizeofResource
GetExitCodeProcess
CreateFileW
GetLastError
GetCurrentDirectoryW
GetProcAddress
LockResource
SetCurrentDirectoryW
RemoveDirectoryW
CloseHandle
DeleteFileW
SetFileAttributesW
RegSetValueExW
RegCloseKey
GetLengthSid
RegOpenKeyExW
FreeSid
IsValidSid
AddAccessAllowedAce
AllocateAndInitializeSid
InitializeAcl
RegDeleteValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExW
RegCreateKeyExW
CopySid
OpenProcessToken
GetTokenInformation
memset
DbgPrint
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ