Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
8da3f25a702e74fec58758a544521ac5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8da3f25a702e74fec58758a544521ac5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
8da3f25a702e74fec58758a544521ac5_JaffaCakes118
Size
86KB
MD5
8da3f25a702e74fec58758a544521ac5
SHA1
1f6f043b9d5c59deafbb431bed8b3663701d6401
SHA256
4cd90711aed2350901b219991ff343e0b052b9509a1e8f0b9545c254e661d81e
SHA512
aa8a68e43b0c7d02508f779f8f1531dd473263b21c01f6fdf70b9dbb14cc2864c4c904aec295c271f00612a3dbef4c16b9a62cb5fd81a5ed4ff0b3a42f58e7eb
SSDEEP
1536:56wD2k0DXJXplwbocjk/K1g+wocRD6wIUBM5pHjXj9YO7N:IzRXTwRjkC8nD6wPi5pDXhYi
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
AllocConsole
CloseHandle
CompareStringA
CreateEventA
CreateThread
EnterCriticalSection
ExitProcess
ExitThread
FindClose
FindFirstFileA
FormatMessageA
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetDateFormatA
GetExitCodeProcess
GetLocalTime
GetModuleFileNameA
GetProcAddress
GetStartupInfoA
GetSystemDefaultLCID
GetTickCount
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
MoveFileW
MulDiv
SetCurrentDirectoryA
SetErrorMode
SetLastError
Sleep
TerminateProcess
WaitForSingleObject
WriteConsoleA
lstrlenA
CopyRect
DeleteMenu
GetClassInfoExW
GetDlgCtrlID
GetKeyState
GetParent
InflateRect
IntersectRect
IsWindowEnabled
MessageBoxW
PostQuitMessage
SendMessageW
SetForegroundWindow
SystemParametersInfoA
TrackPopupMenu
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ