Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
7e4c0819c39fb501248cd3053f83114d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7e4c0819c39fb501248cd3053f83114d_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
7e4c0819c39fb501248cd3053f83114d_JaffaCakes118
Size
145KB
MD5
7e4c0819c39fb501248cd3053f83114d
SHA1
0f53d350d496ae10b54dc17f9fa55b7a1d628d4d
SHA256
c0a5ad04f32a1208685630bbdb95df231298c09e8d902a35d0b594beea7856c7
SHA512
be7923d60af8a0a2eefe48845ca8a8b3b30153fa420661539acd7a2afd28bc568d342ba723234d1a2b1212de566b6bcc4750e94b1f8c78eca9237cd20e0bc6a9
SSDEEP
3072:oE6guz6yAND2QzUuQ70zOPw5m1KVtCDN85OfmPcJyT7hPG6Rx4N:o3guzhos5Pw+KVtCDutPiaY6EN
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegReplaceKeyW
RegCreateKeyExA
LogonUserW
RegSaveKeyW
OpenEventLogA
RegOpenKeyA
RegEnumKeyA
RegUnLoadKeyW
OpenServiceA
RegDeleteValueA
PhoneBookEnumNumbers
PhoneBookFreeFilter
PhoneBookLoad
PhoneBookCopyFilter
PhoneBookEnumCountries
CrackName
CheckADsError
Format
FormatEx
Recover
UrlUnescapeA
UrlHashW
UrlCombineW
UrlUnescapeA
UrlGetLocationW
UrlIsA
UrlIsNoHistoryW
UrlCompareA
UrlCanonicalizeW
UrlGetPartA
PathCompactPathW
PathCommonPrefixW
CertCompareCertificate
CertRemoveStoreFromCollection
CertOpenStore
CertSaveStore
CertAlgIdToOID
CertGetNameStringA
CertDeleteCRLFromStore
CertFindChainInStore
CertFindCRLInStore
CertNameToStrA
CertDuplicateCRLContext
CryptEnumOIDInfo
ClusterEnum
CloseClusterNode
CloseCluster
CloseClusterGroup
FindNextFileA
GetModuleHandleA
FindClose
WriteConsoleA
lstrcmp
GetProcAddress
CreateProcessW
GetFileAttributesA
FindFirstFileW
CreateJobObjectA
GetConsoleTitleW
lstrcpy
CreateDirectoryA
OpenProcess
OpenThread
GetLogicalDriveStringsW
lstrcmpiA
WaitForSingleObject
DeleteFileA
GetCommandLineA
GetEnvironmentVariableA
GetPriorityClass
GetTempFileNameA
LoadLibraryA
CreateFileMappingW
FileTimeToSystemTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ