Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
87c019af911df8e4a6487761a6880dcb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
87c019af911df8e4a6487761a6880dcb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
87c019af911df8e4a6487761a6880dcb_JaffaCakes118
Size
431KB
MD5
87c019af911df8e4a6487761a6880dcb
SHA1
1b2c8ed889082a096f5cd6f015e116711b482bcf
SHA256
aaba69bc38ad5a07ef5e67d45d1b4e46b5d330ad4198fe73975066304b02ad7f
SHA512
6fb45b8bc4d0438e25e0122608db1d2336b2ed1be62266f2e9521d58a6abf3091a1db324d8238e5e6085f209230358e72189d020bfba006c056acf9188a9d06a
SSDEEP
12288:V4k3ViprBlWaQBDrIrUgbVDgmb33cEfpjUb15R9xrdOL:V4kWg0URXdM
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
URLDownloadToCacheFileA
SetLastError
GetLastError
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileA
CloseHandle
RaiseException
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
lstrlenW
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleFileNameA
Sleep
GetExitCodeProcess
WaitForSingleObject
GetModuleHandleA
LoadLibraryA
GetCurrentProcess
OpenProcess
GetVersion
CopyFileExA
GetTempPathA
ExpandEnvironmentStringsA
MoveFileExA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetModuleFileNameW
FormatMessageA
LocalFree
DeleteCriticalSection
InitializeCriticalSection
OutputDebugStringA
DebugBreak
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
lstrlenA
InterlockedDecrement
TerminateProcess
LoadLibraryW
ExitProcess
GetFileType
GetStdHandle
SetEnvironmentVariableA
CompareStringW
CreateFileW
GetProcessHeap
SetEndOfFile
WriteConsoleW
SetHandleCount
HeapSize
HeapCreate
GetStringTypeW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
InterlockedExchange
EncodePointer
DecodePointer
HeapFree
RtlUnwind
GetSystemTimeAsFileTime
GetLocalTime
HeapAlloc
HeapReAlloc
VirtualProtect
VirtualAlloc
GetModuleHandleW
GetSystemInfo
VirtualQuery
GetCommandLineA
HeapSetInformation
GetStartupInfoW
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetACP
AttachThreadInput
SetForegroundWindow
BringWindowToTop
SetFocus
GetWindowThreadProcessId
PostMessageA
MessageBoxA
GetForegroundWindow
EnumWindows
GetWindowTextA
CharLowerA
DestroyWindow
CharNextA
LoadStringA
wvsprintfA
FindWindowExA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryInfoKeyW
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
OpenProcessToken
ShellExecuteExA
SHGetFolderPathA
CoInitialize
CoUninitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
VariantClear
VarUI4FromStr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ