Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
362d4b74b3d48a494b89ea7b6a99c0a3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
362d4b74b3d48a494b89ea7b6a99c0a3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
362d4b74b3d48a494b89ea7b6a99c0a3_JaffaCakes118
Size
250KB
MD5
362d4b74b3d48a494b89ea7b6a99c0a3
SHA1
7cfd7f0bb2fefac8a3399c92fad3f50513ffcbae
SHA256
efa81d4a2ddf7fd992df191b3e1afe458616ec1a6cc5c3b6a9446f6f6a8a8f48
SHA512
82091c5b977a3a94279bf0de7009a7450e063c30b8819d02f36d95d2c66a6cdac6a5445ca42d2819c14b1ddb86a293308abb4bdbfe92324939fe60c394e4c9ed
SSDEEP
6144:fST7vS15CFJDv+CzqxXmbBrTqjEZA0t86IVAQklAiY/hZLC:fS328TPJqWPvIVLSAzbO
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Dev\Tin7\InstallDir\vc80-win32u\Loader.pdb
HeapAlloc
HeapFree
OutputDebugStringA
lstrcpynW
UnmapViewOfFile
MultiByteToWideChar
MapViewOfFile
CloseHandle
CreateFileMappingW
GetFileSize
CreateFileW
lstrlenW
GetCommandLineW
ExitProcess
Sleep
DeleteFileW
SetFileAttributesW
GetFileAttributesW
FreeLibrary
GetProcAddress
LoadLibraryW
GetTempPathW
GetModuleHandleW
GetLastError
GetModuleFileNameW
GetCurrentProcessId
GetProcessHeap
ReadFile
WriteFile
SetFileTime
SetFilePointer
MessageBoxA
wvsprintfA
wsprintfW
PostMessageW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ