Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageKeyEncipherment
Static task
static1
Behavioral task
behavioral1
Sample
8f5cee5e347eb898fb2c48eed0115ba4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8f5cee5e347eb898fb2c48eed0115ba4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
8f5cee5e347eb898fb2c48eed0115ba4_JaffaCakes118
Size
2.0MB
MD5
8f5cee5e347eb898fb2c48eed0115ba4
SHA1
55abfc3507ccef28797a79594bccb50813f25cd0
SHA256
16fdb4e99207053c4baaab8d36f7f6433cd11b0828bddd5c7b7747f599932243
SHA512
df04787b78eebbc4fafe7093335721bd4c4cebf1c869bbe71b0dce2457ceba0e3f4c3cd9ff4cbd84af564df23af8e4302193935c743a77907961d03bc140b5ec
SSDEEP
6144:zPAB3cxZydYG5kbAnzhxmRlxaaZ4dOZ9vfEuwzRHRvH4tHFrqiazU0R/LC:zPO3UanFxUxeCtEuKRHRvglrJ0R/LC
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageKeyEncipherment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentDirectoryW
GetCurrentProcessId
ExitProcess
GetProcAddress
GetCurrentThreadId
WriteFile
LoadLibraryA
HeapAlloc
GetCommandLineA
EncodePointer
DecodePointer
GetLastError
InterlockedDecrement
GetModuleHandleExW
MultiByteToWideChar
GetStdHandle
GetModuleFileNameW
GetProcessHeap
SetLastError
InterlockedIncrement
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
Sleep
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringW
LoadLibraryW
RtlUnwind
HeapSize
HeapReAlloc
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
OpenProcessToken
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ