Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
4b45ec3dcfca4b5476d88f8a78c25b25_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4b45ec3dcfca4b5476d88f8a78c25b25_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
4b45ec3dcfca4b5476d88f8a78c25b25_JaffaCakes118
Size
2.4MB
MD5
4b45ec3dcfca4b5476d88f8a78c25b25
SHA1
e79f50d58e2afba12da465314333ff0929de24df
SHA256
9d90858512c3a5858983ff2472673988771a64dd10dc5be4a18e6c196fc3f85f
SHA512
4dd9c1e23a7ea838db0498cbb0c11284d43bee8a29b5c3fd54a87716f9657e0c6f20ae4493393e11dd72ba8208c4594ccdf80ed81ad6b3e015bd85bf134f188f
SSDEEP
49152:9yPVSwfX9E/nKbsjFszNQQhWJuJD4gRyHXjW2sYtgC02mIrlchmd+zU1fKyqaPT4:QfYngsjqzaQQ8/8jW2N1mZkd+zU0yqaB
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Elevated_MpMiniSigStub.pdb
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetCommandLineW
ExitProcess
HeapSetInformation
FindResourceW
FreeLibrary
LoadResource
CreateProcessW
HeapAlloc
GetSystemWindowsDirectoryW
HeapFree
CreateDirectoryW
WaitForSingleObject
GetProcessHeap
WriteFile
GetSystemDirectoryW
LoadLibraryW
SizeofResource
GetExitCodeProcess
CreateFileW
GetLastError
GetCurrentDirectoryW
GetProcAddress
LockResource
SetCurrentDirectoryW
RemoveDirectoryW
CloseHandle
DeleteFileW
SetFileAttributesW
RegSetValueExW
RegCloseKey
GetLengthSid
RegOpenKeyExW
FreeSid
IsValidSid
AddAccessAllowedAce
AllocateAndInitializeSid
InitializeAcl
RegDeleteValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExW
RegCreateKeyExW
CopySid
OpenProcessToken
GetTokenInformation
memset
DbgPrint
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ