Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
3f84e82db74116763c50184b07c3930a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3f84e82db74116763c50184b07c3930a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
3f84e82db74116763c50184b07c3930a_JaffaCakes118
Size
562KB
MD5
3f84e82db74116763c50184b07c3930a
SHA1
b91f19b77cfcdfaf4f31cfce3ad270ed5a0b4842
SHA256
2302cd88de35eda3ae9be15bb02eb0fb56d63a44f19af8bf1fcc59dfb36aa773
SHA512
d6a43aa66ce0fd69f2d3fb330a6fb1ede35897c1714cc2a2fc2fa7c940785a2c8f8c88e4511d50709a7dc892d1e3213b217ea1e049798019fa0dedd4777ce14a
SSDEEP
6144:LLMPULy6z/jikNisGDcRFqZds5NH42KidqZFXdW6p2Sz4ys9xqDfYsEbLapzEM:LIM3iDD4QuH42KyqZ9p2Sa9KfYsYu9
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualFree
SetThreadPriority
GetModuleHandleA
OpenEventA
VirtualAlloc
TerminateThread
LoadLibraryA
GetProcAddress
OpenSemaphoreA
GetTickCount
VirtualProtect
GetLocaleInfoA
GetStringTypeW
TerminateProcess
FindClose
GetStringTypeA
LCMapStringW
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
HeapSize
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
GetSystemInfo
GetDesktopWindow
IsWindowVisible
SelectObject
recv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ