Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
7763f5344c7f80cde06f73ed4584827a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7763f5344c7f80cde06f73ed4584827a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
7763f5344c7f80cde06f73ed4584827a_JaffaCakes118
Size
2.4MB
MD5
7763f5344c7f80cde06f73ed4584827a
SHA1
8ce7288d2940d6f50c8a2cab54aae92a54f1ec83
SHA256
6b608063a1f756398bb5f2eab26971051a5ba0e5801f52167a715a3112d9e9b9
SHA512
ed93cb83ff18efd6264708cb654318bc65b58868dceff007e13d88b8b382f31e219667d60ce3fa3ac552f88373fbcf6b1e8ab1e6acce5a003d901c3279654685
SSDEEP
49152:W2uarDViXID1CfCVoS9pOxHxnvf6hkKRf1OD2lgagbP4KFp/XSXQfJSdAZoDMcGo:nua9iXKyC6HxnIpF1ODNbP4Y/XS7+Z4N
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Elevated_MpMiniSigStub.pdb
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetCommandLineW
ExitProcess
HeapSetInformation
FindResourceW
FreeLibrary
LoadResource
CreateProcessW
HeapAlloc
GetSystemWindowsDirectoryW
HeapFree
CreateDirectoryW
WaitForSingleObject
GetProcessHeap
WriteFile
GetSystemDirectoryW
LoadLibraryW
SizeofResource
GetExitCodeProcess
CreateFileW
GetLastError
GetCurrentDirectoryW
GetProcAddress
LockResource
SetCurrentDirectoryW
RemoveDirectoryW
CloseHandle
DeleteFileW
SetFileAttributesW
RegSetValueExW
RegCloseKey
GetLengthSid
RegOpenKeyExW
FreeSid
IsValidSid
AddAccessAllowedAce
AllocateAndInitializeSid
InitializeAcl
RegDeleteValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExW
RegCreateKeyExW
CopySid
OpenProcessToken
GetTokenInformation
memset
DbgPrint
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ