Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
5e95e169fda90900ff40d7a73eb42393_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5e95e169fda90900ff40d7a73eb42393_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
5e95e169fda90900ff40d7a73eb42393_JaffaCakes118
Size
120KB
MD5
5e95e169fda90900ff40d7a73eb42393
SHA1
a76df8eea7ee5072cffeb570d674ebf5445e12b0
SHA256
21223efde7c1ecf7a26be096bfcb1cce998379422fb7413c74fe8748ddbab6d7
SHA512
df2ece49178e4c40f3c7af73cef5aff177e853df4a308adf218a18b7526de59f0a35638188582dc4f85f9108801d568b1f72ec40d2bbf613231c062c4c832fe6
SSDEEP
3072:2zmZ9hqQaJZlbcMqCbyGc7vuVdfPEQYf++:2zmYLbcMqzGc7vua++
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PeekNamedPipe
LoadLibraryA
GetDiskFreeSpaceA
CreateFileA
FindNextFileA
LockResource
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
Sleep
LoadResource
SizeofResource
FindClose
GetTickCount
GetModuleHandleA
FindResourceW
FindResourceExW
GetTempPathA
GetFileAttributesA
FindFirstFileA
CopyFileA
WideCharToMultiByte
EncodePointer
DecodePointer
RaiseException
RtlUnwind
AreFileApisANSI
MultiByteToWideChar
GetSystemTimeAsFileTime
GetCommandLineA
GetStdHandle
WriteFile
GetModuleFileNameW
IsProcessorFeaturePresent
HeapAlloc
HeapFree
InterlockedDecrement
ExitProcess
GetModuleHandleExW
HeapSize
IsDebuggerPresent
SetLastError
InterlockedIncrement
GetCurrentThreadId
MoveFileExW
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetProcessHeap
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
LoadLibraryExW
LoadLibraryW
LCMapStringW
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointerEx
GetStringTypeW
FlushFileBuffers
SetStdHandle
WriteConsoleW
CloseHandle
CreateFileW
HeapDestroy
DeleteCriticalSection
InitializeCriticalSection
UnhandledExceptionFilter
GetProcAddress
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
SHCreateDirectoryExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ