Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
27c02981fe953953d6fee211593ac81a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27c02981fe953953d6fee211593ac81a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Target
27c02981fe953953d6fee211593ac81a_JaffaCakes118
Size
328KB
MD5
27c02981fe953953d6fee211593ac81a
SHA1
7d84ff6b390f8348bd08e067d3872f78a2efe721
SHA256
80c9806742b066ba9bd2f80bd44aa81e3c5a93fc3247b485242321ef8f9f2e29
SHA512
1c2b45ad9c7418691883cb400ed90ccec410f969a6d130f91dde7f7a122b27fc7849cab7fb341f1f9f8482625722fbebf0084c2adcfe4d0d149b5530befb6e46
SSDEEP
6144:ApnejRV1Q1fmIdvoUIw6kWsdRE0hu0bLWmEKilk0TylxlY:ApyRV1QJbdvoUIwjE0HbLWmEKnPe
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
URLDownloadToCacheFileA
GetProcAddress
GetModuleHandleA
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleFileNameA
Sleep
GetExitCodeProcess
WaitForSingleObject
TerminateProcess
OpenProcess
SetLastError
HeapFree
HeapAlloc
LoadLibraryA
CloseHandle
InitializeCriticalSectionAndSpinCount
GetVersion
CopyFileExA
GetTempPathA
ExpandEnvironmentStringsA
MoveFileExA
LocalFree
LoadLibraryW
CreateFileA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
LCMapStringW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
GetLastError
RaiseException
DeleteCriticalSection
InitializeCriticalSection
OutputDebugStringA
DebugBreak
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
lstrlenA
InterlockedDecrement
GetCurrentProcess
FreeEnvironmentStringsW
SetFilePointer
ReadFile
SetEnvironmentVariableA
CompareStringW
CreateFileW
GetProcessHeap
SetEndOfFile
GetTimeZoneInformation
HeapReAlloc
GetModuleFileNameW
WriteFile
HeapCreate
ExitProcess
HeapSize
GetFileType
GetStdHandle
SetHandleCount
IsDebuggerPresent
RtlUnwind
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetLocalTime
VirtualProtect
VirtualAlloc
GetModuleHandleW
GetSystemInfo
VirtualQuery
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WriteConsoleW
FindWindowExA
AttachThreadInput
SetForegroundWindow
BringWindowToTop
SetFocus
GetWindowThreadProcessId
PostMessageA
GetForegroundWindow
MessageBoxA
EnumWindows
GetWindowTextA
CharLowerA
DestroyWindow
CharNextA
LoadStringA
wvsprintfA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumKeyExA
RegQueryInfoKeyW
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
OpenProcessToken
SHGetFolderPathA
ShellExecuteExA
CoInitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
VariantClear
VarUI4FromStr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ