Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
854277959bf948feea8bc1d8e3b34212_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
854277959bf948feea8bc1d8e3b34212_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
854277959bf948feea8bc1d8e3b34212_JaffaCakes118
Size
466KB
MD5
854277959bf948feea8bc1d8e3b34212
SHA1
841ae1dd6c4364098f450f676297bcbd84629dee
SHA256
1690e8e0b112601750e8ec7b7cb223e9133673c4a2f736b26b02ef4228da6243
SHA512
6b5e8d217f19e5b85b4111023decd6a606ff055d54667dcd844c5fc7ae770230999567577d74f1199d30e7a55cb3ef0dfb62513e78ecfc3beea82a49ac214825
SSDEEP
6144:gJW2Jxtj+5IbDlckgPQaKOiPsl9ixipY4NbYyJThgclmIQUKOCMpTBtAo85Ps:0W0+5IbDlc3J9CiFNbYypPmJhO/pTPes
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
InternetOpenA
InternetCloseHandle
InternetConnectA
InternetReadFile
InternetSetOptionA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetCrackUrlA
FindResourceW
FindResourceExW
WideCharToMultiByte
OpenThread
GetMailslotInfo
FindClose
GetModuleHandleA
FindFirstFileA
FindNextFileA
MultiByteToWideChar
PeekNamedPipe
CreateMutexA
GetModuleFileNameA
FindResourceA
GetTempPathA
GetTimeZoneInformation
GetDiskFreeSpaceA
CreateFileA
HeapAlloc
HeapFree
GetProcessHeap
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32First
Process32Next
GetFileSize
GetFileSizeEx
WriteFile
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
GetSystemTimeAsFileTime
CreateDirectoryA
GetFileAttributesA
LocalFree
GetVersion
InterlockedIncrement
InterlockedDecrement
RaiseException
GetCurrentThreadId
SetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetProcAddress
GetVersionExA
OpenMutexA
FormatMessageA
GetTickCount
DosDateTimeToFileTime
lstrcmpiA
LoadLibraryExA
IsDBCSLeadByte
CompareStringW
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetCommandLineA
IsDebuggerPresent
LoadLibraryExW
VirtualQuery
VirtualProtect
GetSystemInfo
RtlUnwind
GetStringTypeW
DecodePointer
EncodePointer
VirtualAlloc
IsProcessorFeaturePresent
GetACP
HeapSize
HeapReAlloc
HeapDestroy
IsValidCodePage
AreFileApisANSI
FreeLibrary
LockResource
FreeEnvironmentStringsW
OutputDebugStringW
LoadLibraryW
SetFilePointerEx
SetStdHandle
WriteConsoleW
CreateFileW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
CloseHandle
GetFileType
SizeofResource
LoadResource
Sleep
WaitForSingleObject
GetLastError
TerminateProcess
GetCurrentProcess
FileTimeToSystemTime
OpenProcess
SetEnvironmentVariableA
ReadConsoleW
GetOEMCP
GetEnvironmentStringsW
LCMapStringW
QueryPerformanceCounter
GetConsoleMode
GetLocaleInfoW
GetConsoleCP
LoadStringA
CharNextA
PostMessageA
UnregisterClassA
RegEnumValueA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryInfoKeyW
RegCreateKeyExA
SHFileOperationA
SHGetFolderPathA
ShellExecuteExA
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
VariantClear
VarUI4FromStr
UrlEscapeA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ