Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
713ea9267f9f1143e28051865246667b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
713ea9267f9f1143e28051865246667b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
713ea9267f9f1143e28051865246667b_JaffaCakes118
Size
231KB
MD5
713ea9267f9f1143e28051865246667b
SHA1
4fef15f65bbab5a6735250d3ab5bedde1c14a3fa
SHA256
444c719aac616700c79109830448fa856fad2e1e23d2bc38f9203542675025a3
SHA512
2af6f0f320a494ba2df27e86de1714c2ada779af2527eca7acf52ad81c2828c21c90f03059b37ab87cd4b83065dd52aaf7779339cfd96d6fce8ce610148a17f5
SSDEEP
6144:OVHAS9YnMSvQNH33TTP773T3PLLTTLLfPTDTTz7fL33LTjLLLb3bHT/333T7fTT4:AHAS9YhQuJ
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrToIntA
wnsprintfA
StrStrA
StrStrIA
PathFileExistsA
StrNCatA
CloseHandle
GetComputerNameA
GetVolumeInformationA
MoveFileExA
GetCurrentProcess
Process32First
GetTickCount
GetWindowsDirectoryA
Sleep
CreateProcessA
FindFirstFileA
RemoveDirectoryA
FindClose
GetPrivateProfileStringA
Process32Next
GetModuleFileNameA
FindNextFileA
CreateToolhelp32Snapshot
GetVersionExA
GetTempPathA
DeleteFileA
lstrcmpiA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
HeapSize
FlushFileBuffers
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetEndOfFile
SetFilePointer
SetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetLastError
ReadFile
WriteFile
GetProcessHeap
HeapFree
HeapAlloc
GetFileSize
CreateFileA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleHandleA
lstrcatA
lstrcpynA
lstrlenA
RaiseException
InitializeCriticalSectionAndSpinCount
GetStdHandle
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
GetFileType
MultiByteToWideChar
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
SetHandleCount
SendDlgItemMessageA
FillRect
LoadBitmapA
LoadIconA
GetClientRect
ExitWindowsEx
SendMessageA
BeginPaint
IsDialogMessageA
PostQuitMessage
GetWindowLongA
CreateWindowExA
GetDlgItem
DefWindowProcA
SetWindowPos
ShowWindow
IsWindow
DispatchMessageA
AdjustWindowRectEx
SetWindowTextA
UpdateWindow
FindWindowA
LoadCursorA
RegisterClassExA
GetWindowRect
GetMessageA
DestroyWindow
EndPaint
TranslateMessage
BitBlt
GetTextExtentPoint32A
SetTextColor
DeleteDC
CreateFontA
SetBkMode
SelectObject
CreateCompatibleDC
GetObjectA
GetStockObject
CreateSolidBrush
TextOutA
RegDeleteValueA
RegOpenKeyExA
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegCreateKeyA
RegQueryValueExA
SHGetFolderPathA
SHFileOperationA
ShellExecuteA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ