Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
4b259244f86b42e18864c5e87b5f26b2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b259244f86b42e18864c5e87b5f26b2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
4b259244f86b42e18864c5e87b5f26b2_JaffaCakes118
Size
1.4MB
MD5
4b259244f86b42e18864c5e87b5f26b2
SHA1
f4f87a31c8cc37b692d712bbafd77b6b91b54680
SHA256
9fa2b68b6222b05a5fef6d5968d9934d615d1cc471c7806c3fbea035e57c2eda
SHA512
01d2d3e94c5f41bd8ab7e46110bfac2e8f3e992d455cdd095ea1c7996638db78f47964eb94ec8d86d968e8abdd5ccd21cef2ba3466e365248637afd5ea1005fb
SSDEEP
24576:kgByuPC0PmPlBuHC0j8qKcj4opJKDM8L0tA7bw3Fxvqe8ycwS/lvUn0QxkU2k5Iw:jByuPC0OWr8qKWJT8UN8ycwSJkxq8IUT
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\Boy\Desktop\Desktop\obstool_111\obfstool_19_07_2011\test\Template_LoadEXE_msi\Release\LoadEXE.pdb
FindResourceA
GetCurrentProcess
SizeofResource
GetProcAddress
GetModuleHandleA
GetTempPathA
GetLastError
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
RtlUnwind
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetConsoleCP
GetConsoleMode
CloseHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CreateFileA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
FlushFileBuffers
HeapSize
SetEndOfFile
GetProcessHeap
ReadFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ