Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
3ff3a97648c27c70452c73d722c8bd7b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ff3a97648c27c70452c73d722c8bd7b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Target
3ff3a97648c27c70452c73d722c8bd7b_JaffaCakes118
Size
476KB
MD5
3ff3a97648c27c70452c73d722c8bd7b
SHA1
d93b76afbe92ab026bc02f3d40913cdc41a5bd5c
SHA256
218ec9a4d76ca34f38f40543d87796ddf86e21a1c8c094e06394fa94433d3038
SHA512
2451bb716fc5f46325df231bb15ff063b92d46786457a8baeb5716f1e0625ae5bc10e6360c58ef7d66f824a5366440e40497bb36826108960dc7ddd5d205ae7d
SSDEEP
12288:AIxK4W8tZdPYkGgkZxFsnnLi1FyvxprVRsPsoWBBk:S85YkGgC8Li1F4HVRsPsdBq
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
?AwesomiumMain@@YAHPAUHINSTANCE__@@PATSandboxInterfaceInfo@sandbox@@PA_W@Z
InterlockedExchange
SignalObjectAndWait
FreeLibrary
LoadLibraryW
WriteProcessMemory
MapViewOfFile
CreateFileMappingW
GetExitCodeProcess
GetThreadContext
AssignProcessToJobObject
InterlockedIncrement
InterlockedDecrement
UnregisterWaitEx
RegisterWaitForSingleObject
GetVersionExW
CreateJobObjectW
CreateMutexW
GetCurrentProcessId
GetModuleHandleW
VirtualFreeEx
VirtualAllocEx
VirtualProtectEx
CreateNamedPipeW
CreateProcessW
OpenEventW
SearchPathW
DebugBreak
lstrlenW
WideCharToMultiByte
VirtualQuery
GetProcAddress
GetCurrentDirectoryW
ReadProcessMemory
SuspendThread
GetModuleFileNameW
GetLongPathNameW
GetFileAttributesW
QueryDosDeviceW
InterlockedCompareExchange
SetFilePointer
CreateFileW
ReleaseMutex
WriteFile
OutputDebugStringA
GetModuleHandleA
Sleep
RaiseException
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
GetUserDefaultLCID
GetStringTypeA
GetLocaleInfoA
IsValidCodePage
GetOEMCP
GetACP
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetTimeZoneInformation
SetEnvironmentVariableA
HeapReAlloc
VirtualAlloc
HeapSize
QueryPerformanceCounter
VirtualFree
ResumeThread
LocalFree
PostQueuedCompletionStatus
DeleteCriticalSection
CreateIoCompletionPort
CreateEventW
CreateThread
GetCurrentThreadId
DuplicateHandle
ResetEvent
GetQueuedCompletionStatus
SetEvent
TerminateJobObject
CloseHandle
InitializeCriticalSection
GetLastError
SetLastError
WaitForSingleObject
SetInformationJobObject
LeaveCriticalSection
EnterCriticalSection
GetTickCount
TerminateProcess
GetCurrentProcess
EnumSystemLocalesA
IsValidLocale
ReadFile
LoadLibraryA
GetLocaleInfoW
CreateFileA
CompareStringA
CompareStringW
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetFileType
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
HeapAlloc
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeW
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
CloseWindowStation
MessageBoxW
GetUserObjectInformationW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
RegOpenKeyExW
RegCreateKeyExW
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
GetTokenInformation
EqualSid
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
CreateProcessAsUserW
SetThreadToken
OpenProcessToken
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityInfo
RevertToSelf
RegDisablePredefinedCache
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE