Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
af3e6cb16e1623c523fbfdffc5362ad1_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
af3e6cb16e1623c523fbfdffc5362ad1_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Target
af3e6cb16e1623c523fbfdffc5362ad1_JaffaCakes118
Size
566KB
MD5
af3e6cb16e1623c523fbfdffc5362ad1
SHA1
32994bb80ab076694b76c7502c9942de62749974
SHA256
2350fd201a53e4b9bfed02391c1b6a2fc48bd54500ec23e5b844c760b6be8a7f
SHA512
60c04169ff8ded4c9489e802f315b286b2ade39cdcad2015986798da3326f7435141c551de8c955c616c92c1997ef1d9fe18fadd8ce001304492272bfa0f3ddc
SSDEEP
12288:Ve/tl441kYtBCD2AVIAUvjYDAoiyuT1cOdYO:AFlR1RIDAvjRoi1T1cK9
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FindClose
LoadLibraryExA
LoadLibraryA
GetModuleHandleA
CreateThread
VirtualAlloc
VirtualLock
GetProcAddress
CreateEventA
GetThreadPriority
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
HeapSize
QueryPerformanceCounter
GetTickCount
GetSystemInfo
LoadBitmapW
LoadIconW
LoadCursorA
IsWindowVisible
ord165
send
recv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ