Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
674873a318922e29155b1fb7f53b94bd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
674873a318922e29155b1fb7f53b94bd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
674873a318922e29155b1fb7f53b94bd_JaffaCakes118
Size
328KB
MD5
674873a318922e29155b1fb7f53b94bd
SHA1
553f3b993572316841ae0b33cd863e7d58258245
SHA256
8581726b93e6eceaebf5570070a3a714aa66d5196bc539e89761e890c6ad1075
SHA512
788171fde7423bd5fb42a45bb822476d93aa6ec440263d53fbebc274b13ef6531c341b50e5a14689c68581fce034db468f98f25c8d77608c6ebd4587cea58cd5
SSDEEP
6144:ApnejRV1Q1fmIdvoUIw6kWsdRE0hu0bLWmEKilk0TylxlA:ApyRV1QJbdvoUIwjE0HbLWmEKnP2
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
URLDownloadToCacheFileA
GetProcAddress
GetModuleHandleA
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleFileNameA
Sleep
GetExitCodeProcess
WaitForSingleObject
TerminateProcess
OpenProcess
SetLastError
HeapFree
HeapAlloc
LoadLibraryA
CloseHandle
InitializeCriticalSectionAndSpinCount
GetVersion
CopyFileExA
GetTempPathA
ExpandEnvironmentStringsA
MoveFileExA
LocalFree
LoadLibraryW
CreateFileA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
LCMapStringW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
GetLastError
RaiseException
DeleteCriticalSection
InitializeCriticalSection
OutputDebugStringA
DebugBreak
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
lstrlenA
InterlockedDecrement
GetCurrentProcess
FreeEnvironmentStringsW
SetFilePointer
ReadFile
SetEnvironmentVariableA
CompareStringW
CreateFileW
GetProcessHeap
SetEndOfFile
GetTimeZoneInformation
HeapReAlloc
GetModuleFileNameW
WriteFile
HeapCreate
ExitProcess
HeapSize
GetFileType
GetStdHandle
SetHandleCount
IsDebuggerPresent
RtlUnwind
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
GetLocalTime
VirtualProtect
VirtualAlloc
GetModuleHandleW
GetSystemInfo
VirtualQuery
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WriteConsoleW
FindWindowExA
AttachThreadInput
SetForegroundWindow
BringWindowToTop
SetFocus
GetWindowThreadProcessId
PostMessageA
GetForegroundWindow
MessageBoxA
EnumWindows
GetWindowTextA
CharLowerA
DestroyWindow
CharNextA
LoadStringA
wvsprintfA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumKeyExA
RegQueryInfoKeyW
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
OpenProcessToken
SHGetFolderPathA
ShellExecuteExA
CoInitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
VariantClear
VarUI4FromStr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ