Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
3f4ce2443b7a4405f2b394da04dd70fb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f4ce2443b7a4405f2b394da04dd70fb_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
3f4ce2443b7a4405f2b394da04dd70fb_JaffaCakes118
Size
779KB
MD5
3f4ce2443b7a4405f2b394da04dd70fb
SHA1
b647209ac53ebed27fd36cb05d79bd17ccd3013f
SHA256
5f865cf87243eb86d9b5ebaa5b24eec05de66c8c31df07c36c547c4ba31c82e2
SHA512
aab6932ed648c7509df70c9b355c53e8622d9b0216adce786d98934adf48711f355e75ec351a4af4913bc48a34b1f22f99e49f60be1898add5b1626d6425d921
SSDEEP
12288:QWDklsSgiuslRw1aIEnPkOnPeCoBK4DVPmI2VI13k8dytVE4krXfB:QWDkaSHIh+WK4ZPqYUiS0XJ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetCloseHandle
InternetConnectW
InternetOpenW
InternetCanonicalizeUrlW
HttpQueryInfoW
HttpSendRequestW
HttpOpenRequestW
InternetReadFile
GetProcAddress
GetSystemInfo
GetModuleHandleW
GetTempPathW
GetVersionExW
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
ReadConsoleW
WaitForMultipleObjects
GetACP
IsValidCodePage
SetFilePointerEx
GetFileType
GetStdHandle
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
GetProcessHeap
HeapSize
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
LoadLibraryExW
ExitThread
CreateSemaphoreW
GetTickCount
CreateProcessW
GetModuleFileNameW
GetSystemTimeAsFileTime
CloseHandle
DeleteFileW
GetLastError
GetFileAttributesW
UnregisterWaitEx
SetStdHandle
GetTimeZoneInformation
WriteConsoleW
CreateFileW
LoadLibraryW
SetEndOfFile
GetOEMCP
GetCurrentThread
GetStartupInfoW
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
UnregisterWait
RegisterWaitForSingleObject
GetCurrentThreadId
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
DuplicateHandle
GetCurrentProcess
SetEnvironmentVariableA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
RaiseException
RtlUnwind
HeapFree
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
GetCPInfo
HeapAlloc
ReadFile
GetCommandLineW
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
Sleep
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
MoveWindow
SetWindowLongW
GetDlgItem
LoadStringW
LoadIconW
EndPaint
BeginPaint
UpdateWindow
EndDialog
DialogBoxParamW
RegisterClassExW
PostQuitMessage
DefWindowProcW
SystemParametersInfoW
ReleaseDC
GetDC
EnableWindow
DestroyIcon
MessageBoxW
TranslateAcceleratorW
LoadAcceleratorsW
DispatchMessageW
TranslateMessage
GetMessageW
LoadCursorW
IsDlgButtonChecked
GetWindowLongW
GetSysColor
SetCursor
RemovePropW
GetPropW
SetPropW
InvalidateRect
CallWindowProcW
SetWindowTextW
SetWindowPos
ShowWindow
CreateWindowExW
PostMessageW
GetParent
GetWindowRect
GetClientRect
GetSystemMetrics
SendMessageW
SelectObject
GetTextExtentPoint32W
GetObjectW
SetTextColor
GetStockObject
DeleteObject
CreateFontIndirectW
GetTextMetricsW
GetSaveFileNameW
RegQueryValueExW
RegOpenKeyExW
RegOpenCurrentUser
RegCloseKey
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
SHCreateDirectoryExW
CoUninitialize
CoInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ