Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
053290e2a4476779170a90a11349f9fe_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
053290e2a4476779170a90a11349f9fe_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Target
053290e2a4476779170a90a11349f9fe_JaffaCakes118
Size
1.1MB
MD5
053290e2a4476779170a90a11349f9fe
SHA1
a002c3250294051b674b1ec697df3419e83ad021
SHA256
c00a29ebd40890dbd219df31d5ef5324da75bdf4872d7fdba4a5e6f638b8e728
SHA512
8eaa81b8743b513564064f15618393f0ff83e58ead0446b529ffdcb2c78edaaab6325698f0f833c763232e3692f3fbe35af5258c61f108a31f52d29ca39bb8f2
SSDEEP
24576:V5d4XR/5Pnp5ItYM/ABtAbghHXjRZqtSIU06jNnuK+raA+gVTPlc5/N8nN:V4t9IWtZ3WtSHRuK+rbVGj8nN
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\build\rsc\rsc_builder_applet\depot\3am\products\rescue\Rescue630_PostLaunch\RA\Service\Rescue\rescue_win32.bin\LMIRescue.pdb
GetCurrentProcess
GetWindowsDirectoryA
Sleep
lstrcatA
CreateDirectoryA
SetCurrentDirectoryA
FindFirstFileA
GetLastError
GetProcAddress
RemoveDirectoryA
FindClose
FindNextFileA
GetModuleHandleA
WriteFile
SizeofResource
GetFileAttributesA
CreateProcessA
SetLastError
CopyFileA
LockResource
lstrcpynA
CloseHandle
CreateFileA
FindResourceA
SetFilePointer
FreeResource
LoadResource
FormatMessageA
HeapAlloc
HeapFree
GetProcessHeap
GetStdHandle
ExitProcess
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
lstrlenA
lstrcmpA
lstrcpyA
DeleteFileA
GetModuleFileNameA
GetTempPathA
RtlUnwind
MessageBoxA
wsprintfA
wvsprintfA
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ