Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
87a457dcf91c580987bc9808152d06be_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
87a457dcf91c580987bc9808152d06be_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
87a457dcf91c580987bc9808152d06be_JaffaCakes118
Size
91KB
MD5
87a457dcf91c580987bc9808152d06be
SHA1
d998f5086055a906d53b95bb16e4b3263f06a21e
SHA256
68305ea276d9d0bc19bb53e1d86ccd9937475549fcdc286cfa1835ee7719b603
SHA512
6321731e3fad40412e84b7941f5a4420f379b8fe13ee017c540dd20a7dd465d8cb3d276f222b7eaac06ad8fefdb6b739d3c4bf7937df8d42caa20281aa1a600a
SSDEEP
1536:gznYKt2Gs0tOQpa9GpSsJWxZ543ju8Kk2MCbI+75HaJfORSdLFHJO/wCN:gU8xAKKGFa543ju/lbI+79mfHL38
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
AllocConsole
CloseHandle
CreateFileMappingA
CreateProcessA
CreateThread
EnterCriticalSection
ExitThread
FreeLibrary
GetCurrentProcessId
GetCurrentThread
GetEnvironmentVariableA
GetExitCodeProcess
GetLocaleInfoA
GetModuleFileNameA
GetProcessHeap
GetStdHandle
GetTickCount
GlobalAlloc
GlobalFree
GlobalLock
InitializeCriticalSection
InterlockedExchange
LeaveCriticalSection
LoadLibraryA
LocalAlloc
MultiByteToWideChar
SetErrorMode
SetThreadPriority
Sleep
TerminateProcess
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
lstrcpyA
lstrlenA
AppendMenuW
CharUpperBuffW
EnumChildWindows
FindWindowA
GetDlgCtrlID
GetSysColor
GetWindow
GetWindowThreadProcessId
InvalidateRect
IsMenu
IsRectEmpty
IsZoomed
KillTimer
MapWindowPoints
MessageBoxW
PostThreadMessageW
PtInRect
RegisterHotKey
SendMessageCallbackW
SetActiveWindow
SetCursor
SetWindowPos
ShowWindow
TileWindows
TrackPopupMenu
WindowFromPoint
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ