Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
624b995dd6f6184b8b9bb8db112edd01_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
624b995dd6f6184b8b9bb8db112edd01_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
624b995dd6f6184b8b9bb8db112edd01_JaffaCakes118
Size
681KB
MD5
624b995dd6f6184b8b9bb8db112edd01
SHA1
b9680dbe6989425fa668dfdc073aee756d99503c
SHA256
399afb9b541e3beae1f13a60e20d031e1e5c0883e4479a5d1eec1910c559c697
SHA512
a856bd46a5f5446eb7dace9b32bc681951da17912c9595856b601fee535e8f46b283dd46bb632e1a83b6b068bfe66ede0dd2c070465b0d33d23d4348e971e83e
SSDEEP
12288:qxdkq6nqcAM5/wgu9J44b+m/FOgCSOJeh2:qxdYnqcv/wp9H7tOgBWeh2
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetThreadPriority
VirtualAlloc
HeapAlloc
Sleep
InterlockedExchangeAdd
ResumeThread
CreateDirectoryA
GetWindowsDirectoryA
TerminateThread
InterlockedIncrement
TerminateProcess
SetEnvironmentVariableW
GetCurrentThreadId
SetThreadPriorityBoost
SetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetFilePointer
FlushFileBuffers
GetCurrentDirectoryW
VirtualProtect
GetLastError
LoadLibraryA
GetProcAddress
GetOEMCP
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapReAlloc
GetCurrentProcess
HeapSize
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
CloseHandle
EnableWindow
PostMessageW
MessageBoxA
GetWindowTextW
GetDC
CreateDesktopW
ShowWindow
CreatePen
SysFreeString
recv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ