Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
40ce8c2cb3863292b3dcbf8e822a2db7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
40ce8c2cb3863292b3dcbf8e822a2db7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
40ce8c2cb3863292b3dcbf8e822a2db7_JaffaCakes118
Size
381KB
MD5
40ce8c2cb3863292b3dcbf8e822a2db7
SHA1
8fcc09cd5f37f103e08b986db7d8c732eb9f69a7
SHA256
2dda87e5d305be49e3c771c438eedd093bbe13bc8609beb600e3ca3e9e4c363d
SHA512
7cc0371c853e96e7fc542e94c771125d222dc7b4f638dd1715c9fbce03a81447883aec219b3590779f2f12531d3726fb8bef64d2ea205f25d859bb3e45d78c05
SSDEEP
6144:W6w2lny36fEH4l93wx4J/ZRkfjd4tFs2s3tm+6xSFgOQkfqf9bp:Z8qfEH47qeZRC4tFqc+6xIg9kC9bp
metasploit
encoder/shikata_ga_nai
metasploit
windows/shell_reverse_tcp
192.168.91.143:4444
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\src\Pstools\Psinfo\Exe\Release\Psinfo.pdb
PdhOpenQueryW
PdhAddCounterW
PdhCollectQueryData
PdhGetFormattedCounterValue
PdhCloseQuery
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
NetServerEnum
NetApiBufferFree
inet_ntoa
WSAStartup
gethostbyname
gethostname
WNetCancelConnection2W
WNetAddConnection2W
GetTickCount
CloseHandle
CreateFileW
FreeLibrary
WriteFile
GetStdHandle
FormatMessageA
LoadLibraryExW
GetConsoleScreenBufferInfo
LockResource
SizeofResource
LoadResource
FindResourceW
DeleteFileW
GetSystemDirectoryW
GetComputerNameW
WaitForSingleObject
MultiByteToWideChar
Sleep
GetVersion
GetModuleFileNameW
SetEvent
ConnectNamedPipe
ReadFile
GetDateFormatW
FileTimeToSystemTime
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
LCMapStringA
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
SetLastError
GetLastError
GetProcAddress
GetCommandLineW
LocalAlloc
LocalFree
LoadLibraryW
SetErrorMode
GetModuleHandleW
GetLogicalDrives
GetVolumeInformationW
GetDriveTypeW
GetDiskFreeSpaceExW
SetFilePointer
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetStdHandle
SetEnvironmentVariableA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
GetLocaleInfoW
GetTimeZoneInformation
SetEndOfFile
GetProcessHeap
CompareStringA
CompareStringW
GetCurrentProcess
InterlockedExchange
SetConsoleCtrlHandler
FlushFileBuffers
CreateFileA
RtlUnwind
GetConsoleCP
WideCharToMultiByte
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
ExitThread
GetCurrentThreadId
CreateThread
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
ExitProcess
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
FatalAppExitA
VirtualFree
VirtualAlloc
HeapCreate
HeapDestroy
GetModuleFileNameA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThread
SetHandleCount
GetFileType
GetStartupInfoA
GetDlgItem
GetSysColorBrush
EndDialog
SetWindowTextW
LoadCursorW
SetCursor
InflateRect
SendMessageW
DialogBoxIndirectParamW
SetMapMode
StartDocW
StartPage
EndPage
EndDoc
GetDeviceCaps
PrintDlgW
ImpersonateLoggedOnUser
RegEnumKeyW
RegQueryInfoKeyW
RegOpenKeyW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
LogonUserW
RegConnectRegistryW
RevertToSelf
DeleteService
ControlService
OpenSCManagerW
OpenServiceW
StartServiceW
QueryServiceStatus
CreateServiceW
CloseServiceHandle
RegCreateKeyW
RegQueryValueExW
RegSetValueExW
RegCloseKey
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
SysAllocString
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ