Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
49c76351f940a51709c4644910f7d34d_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
49c76351f940a51709c4644910f7d34d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
49c76351f940a51709c4644910f7d34d_JaffaCakes118
Size
138KB
MD5
49c76351f940a51709c4644910f7d34d
SHA1
bf76e8061d17e419e29b53c2e135534367899cd8
SHA256
137afb6910084d22e3524562dbbe3cc62a65075d60f3216404ce3d6f8a989cc0
SHA512
ae1ed1b54202215b760399c09e3655ea7d1e94c5a42e28bdd35dadafda04ebb2d9115fbc99a5e6969a04c53aa6e8e85dc2d8b80774b4463bf31346843de8a092
SSDEEP
1536:nFDw/WsAdjtP2mjN/LLDV/1oB/bq2n/I8+icD/ivcRsWjcdKR/JO1I4nHEPli0:SWseFdLDy2ub+DKnPI4nHci0
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RaiseException
CreateThread
GetCurrentThreadId
GetProcessId
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
WaitForSingleObject
WaitForMultipleObjects
Sleep
LoadResource
SizeofResource
CloseHandle
GetHandleInformation
CreateEventW
CreateWaitableTimerW
SetWaitableTimer
LoadLibraryW
GetCurrentProcessId
GetModuleHandleW
GetCommandLineW
FindResourceW
FindResourceExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetStringTypeW
LCMapStringW
OpenProcess
GetProcAddress
FreeLibrary
LockResource
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
DecodePointer
WideCharToMultiByte
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
GetCPInfo
GetOEMCP
GetACP
CreateFileW
IsValidCodePage
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
MultiByteToWideChar
GetModuleHandleExW
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
EncodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
ExitThread
LoadLibraryExW
RtlUnwind
GetStdHandle
WriteFile
ExitProcess
TranslateMessage
DispatchMessageW
GetMessageW
RegisterWindowMessageW
SendMessageTimeoutW
PostThreadMessageW
CharUpperW
CharNextW
EnumChildWindows
FindWindowExW
GetClassNameW
CharLowerBuffW
GetWindowThreadProcessId
RegQueryValueExW
RegCreateKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteKeyW
RegCloseKey
RegSetValueExW
CoUninitialize
CoInitializeEx
CoRegisterClassObject
CoRevokeClassObject
CoResumeClassObjects
CoAddRefServerProcess
CoReleaseServerProcess
StringFromGUID2
CLSIDFromString
CoCreateGuid
CoCreateInstance
VariantInit
SysStringLen
VariantClear
SysAllocString
VarBstrCmp
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
DispCallFunc
UnRegisterTypeLi
RegisterTypeLi
LoadRegTypeLi
LoadTypeLi
SysFreeString
PathStripPathW
GetProcessImageFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ