Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
9a0dc7e1efeb8a9bd9532e3904a8987a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9a0dc7e1efeb8a9bd9532e3904a8987a_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Target
9a0dc7e1efeb8a9bd9532e3904a8987a_JaffaCakes118
Size
130KB
MD5
9a0dc7e1efeb8a9bd9532e3904a8987a
SHA1
10963be8fac7418de0e340bdfc067c907b88503c
SHA256
2197065b7b1c2030db1ac5b85717a94cc3c287b94057505189b41e10fcc30a26
SHA512
7a907da34da5aee6f9d299dc9d9f402cdd6c52c0a4c5fa797c75dedec61c053ba8a4a3592b20ee1a7eb885b9029cefd2694323c1c11508832a6417a486037f6b
SSDEEP
3072:Q1DB04CBEn035PvbvOg2HoY7fUgORj6dU7a:Qf30H35PCNJLUg86Wa
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
OpenProcessToken
CloseHandle
CopyFileW
CreateEventA
CreateProcessW
CreateSemaphoreA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileW
FreeConsole
FreeLibrary
GetCommandLineA
GetCommandLineW
GetCurrentProcess
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetVersionExA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
MoveFileExA
ReadFile
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
_wgetenv
_winmajor
_wsplitpath
_wtoi64
_wunlink
abort
asctime
atexit
calloc
fputc
fputs
free
fwrite
localtime
malloc
memcpy
printf
puts
realloc
signal
sprintf
strcat
strcmp
strcpy
strlen
time
vfprintf
wcscat
wcscpy
CommandLineToArgvW
FindExecutableA
EndDialog
GetWindowThreadProcessId
MoveWindow
ScreenToClient
SendDlgItemMessageA
SendMessageA
wsprintfW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE