Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
a6ce9b467fe10153fba84dbbdb9aa486_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a6ce9b467fe10153fba84dbbdb9aa486_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Target
a6ce9b467fe10153fba84dbbdb9aa486_JaffaCakes118
Size
318KB
MD5
a6ce9b467fe10153fba84dbbdb9aa486
SHA1
97ec6d2e40e6cf309c8956937e031e4842218f57
SHA256
22ca5a248e416239f0c90ce2c603ea1d81c2c474d445f6b257e024686ed42c28
SHA512
7f1a1c64732895cdcb83b1dc9d1776dca11e5d38da55a5fe7474bc5c013b70d6cd119d86bc2b060d03d392c537312a59c8536b9bc2dc96122ee5662d1237f731
SSDEEP
6144:dh2aGeIDk4sOMqBr3vx1g6MFjhE76SF738pRtZBTT4CVtUNxEFuVGk:j2LtDk4sOMm7gfRSF738DtPTJSxEkVGk
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
VerQueryValueW
InternetCloseHandle
InternetOpenA
GetCommandLineA
GetProcAddress
GetVersionExA
GetModuleHandleA
GetStartupInfoA
TlsGetValue
GetTickCount
GetVersion
WriteFile
ExitProcess
VirtualAlloc
CreateFileA
ReadFile
GetLastError
CreateFileMappingA
QueryPerformanceCounter
LoadLibraryA
SetFilePointer
GetCurrentProcess
CreateThread
CloseHandle
GetUserDefaultLangID
DeleteFileW
GetCurrentThreadId
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStringTypeW
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
GetCPInfo
GetACP
SetCurrentDirectoryW
GetOEMCP
SetEndOfFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
TerminateProcess
HeapFree
ShowWindow
RegisterClassExA
GetSystemMetrics
Rectangle
AllocateAndInitializeSid
RegCloseKey
SysReAllocStringLen
SysFreeString
SysAllocStringLen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ