Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
894e49e3585cf11fc1220a57ee90cb92_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
894e49e3585cf11fc1220a57ee90cb92_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
894e49e3585cf11fc1220a57ee90cb92_JaffaCakes118
Size
347KB
MD5
894e49e3585cf11fc1220a57ee90cb92
SHA1
ac62778d00babd00682888c5cf0a9e23157b3c85
SHA256
8999f2c40bb660f35d1a1f820502585396711603b2bef51f1ecdabd0d84b7123
SHA512
11a2f7faea696b78dfcc0620e374a9e3d5c9d54e6d118daf302c8f6640a64f50aaf527d8311ca54b905270424e1e745e639f6eb23452f5fe09e433fc0b32f627
SSDEEP
6144:JTmLGlOMV5Z/zcPpbJ454ht9J8yUhDev+y4hnLl9UI550sPynXSLn:JailOMpG4+htvUhS8ll9KXAn
metasploit
encoder/shikata_ga_nai
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\src\Misc\procdump\Release\procdump.pdb
WaitForSingleObject
SetEvent
OpenProcess
Sleep
SizeofResource
FormatMessageW
GetExitCodeProcess
GetTimeFormatW
GetFileAttributesW
TerminateProcess
GetModuleFileNameW
CreateFileW
InterlockedExchange
GetLastError
GetCurrentDirectoryW
Process32FirstW
OpenThread
GetProcessId
SetConsoleCtrlHandler
LockResource
CreateEventW
GetSystemInfo
WaitForMultipleObjects
Process32NextW
GetCurrentProcess
CreateToolhelp32Snapshot
WaitForDebugEvent
CloseHandle
DeleteFileW
GetSystemTime
ExpandEnvironmentStringsW
VirtualQueryEx
ReadProcessMemory
CreateFileA
ReadFile
GetProcessHeap
SetEndOfFile
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
SystemTimeToTzSpecificLocalTime
CreateProcessW
LoadResource
FindResourceW
DebugActiveProcessStop
GetDateFormatW
GetThreadContext
GetFullPathNameW
DebugActiveProcess
lstrcpyW
LocalFree
LocalAlloc
GetProcAddress
LoadLibraryW
GetModuleHandleW
GetCommandLineW
IsBadStringPtrW
lstrlenW
ContinueDebugEvent
SetFilePointer
InitializeCriticalSectionAndSpinCount
HeapFree
HeapAlloc
ExitThread
ResumeThread
CreateThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
RaiseException
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
LCMapStringW
RtlUnwind
HeapSize
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetModuleHandleA
SetWindowTextW
SendMessageW
GetSysColorBrush
EndDialog
IsHungAppWindow
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
wsprintfW
SetCursor
DialogBoxIndirectParamW
LoadCursorW
InflateRect
GetDlgItem
StartPage
GetDeviceCaps
SetMapMode
StartDocW
EndDoc
EndPage
PrintDlgW
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyW
OpenProcessToken
RegSetValueExW
RegCreateKeyW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
PdhOpenQueryW
PdhAddCounterW
PdhCollectQueryData
PdhGetFormattedCounterValue
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ