Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
944a99ba15c906d9c25c5e86401eeae4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
944a99ba15c906d9c25c5e86401eeae4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
944a99ba15c906d9c25c5e86401eeae4_JaffaCakes118
Size
130KB
MD5
944a99ba15c906d9c25c5e86401eeae4
SHA1
3a3bc906be9f559ad2daf18ef26403fbe4a5319e
SHA256
21affb5a39da1f64dc462e4c7ccf5a2ee6a93da01adac01e5f705deeb61955ef
SHA512
8432b655c59503fec4a8e576539dd3719c98ccf8eec90005acc37d7de956fa90856033d7be552cddf6ae5ce3bc14a2f39283f41cc74180813e4d92783a017828
SSDEEP
3072:XU0U2qDF0KaB6n035PvbvOg2HZ71UggRs6dU77Q:XINMV35PCN5hUgx6W7Q
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
OpenProcessToken
CloseHandle
CopyFileW
CreateEventA
CreateProcessW
CreateSemaphoreA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileW
FreeConsole
FreeLibrary
GetCommandLineA
GetCommandLineW
GetCurrentProcess
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetVersionExA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
MoveFileExA
ReadFile
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
_wgetenv
_winmajor
_wsplitpath
_wtoi64
_wunlink
abort
asctime
atexit
calloc
fputc
fputs
free
fwrite
localtime
malloc
memcpy
printf
puts
realloc
signal
sprintf
strcat
strcmp
strcpy
strlen
time
vfprintf
wcscat
wcscpy
CommandLineToArgvW
FindExecutableA
EndDialog
GetWindowThreadProcessId
MoveWindow
ScreenToClient
SendDlgItemMessageA
SendMessageA
wsprintfW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE