Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
420c564313486821efceb65f58455e7b_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
420c564313486821efceb65f58455e7b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
420c564313486821efceb65f58455e7b_JaffaCakes118
Size
911KB
MD5
420c564313486821efceb65f58455e7b
SHA1
aeed6f2f0f9e341fb8314a439fe067003bc8e7aa
SHA256
5c8c274e4dfa863c9fb177c7df24627412e6bc11eafc02c668c26bb4ca5bef79
SHA512
1a4744b65acd0a0302209325accca5de33952aabb90c03ecca7c904de7ffc75ef439015948bb041cef9be70dbbb50a73f1c2304fca93cc15ec068158ec268406
SSDEEP
12288:C3cL3ttofZCp9qVP/Gfow4BoPvbHwpBWXW4Iwab9peMvOn5KS1s8AOyGlA5W4tkt:nLitS+B0vMrOHILXK5KRo+2Z
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetCloseHandle
InternetConnectW
InternetOpenW
InternetCanonicalizeUrlW
HttpQueryInfoW
HttpSendRequestW
HttpOpenRequestW
InternetReadFile
GetProcAddress
GetSystemInfo
GetModuleHandleW
GetTempPathW
GetVersionExW
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
FreeLibrary
GetTimeZoneInformation
WaitForMultipleObjects
GetACP
IsValidCodePage
SetFilePointerEx
ReadFile
GetFileType
GetStdHandle
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
GetProcessHeap
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
LoadLibraryExW
ExitThread
CreateSemaphoreW
GetTickCount
GetStartupInfoW
TerminateProcess
CreateProcessW
GetModuleFileNameW
GetSystemTimeAsFileTime
CloseHandle
DeleteFileW
GetLastError
GetFileAttributesW
UnregisterWaitEx
QueryDepthSList
WriteConsoleW
SetStdHandle
ReadConsoleW
CreateFileW
LoadLibraryW
SetEndOfFile
GetOEMCP
GetCurrentThread
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetCurrentThreadId
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
DuplicateHandle
GetCurrentProcess
SetEnvironmentVariableA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
RaiseException
RtlUnwind
HeapFree
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
GetCPInfo
HeapAlloc
ExitProcess
GetModuleHandleExW
GetCommandLineW
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
Sleep
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
MoveWindow
SetWindowLongW
GetDlgItem
LoadStringW
LoadIconW
EndPaint
BeginPaint
UpdateWindow
EndDialog
DialogBoxParamW
RegisterClassExW
PostQuitMessage
DefWindowProcW
SystemParametersInfoW
ReleaseDC
GetDC
EnableWindow
DestroyIcon
MessageBoxW
TranslateAcceleratorW
LoadAcceleratorsW
DispatchMessageW
TranslateMessage
GetMessageW
LoadCursorW
IsDlgButtonChecked
GetWindowLongW
GetSysColor
SetCursor
RemovePropW
GetPropW
SetPropW
InvalidateRect
CallWindowProcW
SetWindowTextW
SetWindowPos
ShowWindow
CreateWindowExW
PostMessageW
GetParent
GetWindowRect
GetClientRect
GetSystemMetrics
SendMessageW
SelectObject
GetTextExtentPoint32W
GetObjectW
SetTextColor
GetStockObject
DeleteObject
CreateFontIndirectW
GetTextMetricsW
GetSaveFileNameW
RegQueryValueExW
RegOpenKeyExW
RegOpenCurrentUser
RegCloseKey
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
SHCreateDirectoryExW
CoUninitialize
CoInitialize
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ