Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
6090f8064149df3c1312e3480908fa76_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6090f8064149df3c1312e3480908fa76_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
6090f8064149df3c1312e3480908fa76_JaffaCakes118
Size
205KB
MD5
6090f8064149df3c1312e3480908fa76
SHA1
cdeb371f78f32df7cf68821338887472e31fd159
SHA256
20a8f15ef6186413536aad11334983eb0b5036f6f89ece87b2a5d5896b229959
SHA512
5a4cd7ed5b587e9a125ebdcdfde2c7e0b7bae985318227ce094df509ec99d2ba263454e1e4d4e4b1a49e79107f94bd713b9682b843f7183f724eeb12ce47adf0
SSDEEP
3072:zcj+Gkx/35L9o2Qo1ncP+e7yideswtvWFdsYMk+HYkU+IQeKmrLM:zfQo1nYIioswtvWjTMQkTmr4
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Src\Client\Load64\x64\Release\Load64.pdb
FreeLibrary
GetProcAddress
LoadLibraryA
CreateEventA
CreateMutexA
CreateSemaphoreA
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetModuleFileNameA
WideCharToMultiByte
Sleep
MultiByteToWideChar
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCommandLineA
RaiseException
RtlPcToFileHeader
LocalAlloc
HeapFree
ExitThread
CreateThread
LCMapStringA
LCMapStringW
GetCPInfo
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
SetLastError
FlsAlloc
HeapSize
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapSetInformation
HeapCreate
GetCurrentProcessId
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapReAlloc
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
LocalFree
ReleaseSemaphore
ReleaseMutex
ResetEvent
SetEvent
WaitForMultipleObjects
GetLastError
GetVersionExA
IsWow64Process
OpenProcess
Thread32Next
Thread32First
CreateToolhelp32Snapshot
CloseHandle
WaitForSingleObject
OpenEventA
SetUnhandledExceptionFilter
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
RtlUnwindEx
EnterCriticalSection
SetWindowsHookExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
InitializeAcl
SetSecurityInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ