Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
adf545e25fa9d8ae5d877796a8fc097c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
adf545e25fa9d8ae5d877796a8fc097c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
adf545e25fa9d8ae5d877796a8fc097c_JaffaCakes118
Size
555KB
MD5
adf545e25fa9d8ae5d877796a8fc097c
SHA1
12d93e08fcd717e44c91e319419ec594e896a69e
SHA256
8e57f42444ae62262db37b48cee835e1a7c580e40dfd4664e2b67f73cd942835
SHA512
d14108bd07c8fd672a3aac6022d99787da1f9b0d9e132ef7324f6d9cb3f830c6230ae416f328df186c8b080d58644a5622a6768f5b16f3a7e2d435ef452600e6
SSDEEP
12288:k3bw4eCPZKQSX6iP7QDgGTRDh+1j3ExJ2TopsTvkP1HP:k3bw4eCPZKui4gODh+hEnwCsTm1HP
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProfilesDirectoryA
HeapFree
GetProcessHeap
HeapAlloc
WriteFile
CreateProcessA
GetModuleHandleA
SetFilePointer
ReadFile
CreateDirectoryA
GetVolumeInformationA
LocalFree
MultiByteToWideChar
GetCurrentDirectoryA
SleepEx
GlobalFree
GlobalAlloc
OpenProcess
GetCurrentProcess
lstrcmpA
LoadLibraryExA
lstrcmpiA
GetFullPathNameA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
Process32Next
TerminateProcess
Process32First
CreateToolhelp32Snapshot
GetVersionExA
GetModuleFileNameA
WaitForSingleObject
GetSystemTimeAsFileTime
ExitProcess
GetCurrentProcessId
GetFileType
SetHandleCount
GetEnvironmentStringsW
SetEndOfFile
Sleep
CreateFileA
CloseHandle
lstrcpyA
lstrcatA
lstrlenA
FindFirstFileA
GetFileAttributesA
FindNextFileA
FindClose
SetLastError
InterlockedDecrement
ExpandEnvironmentStringsA
LoadLibraryA
GetProcAddress
FreeLibrary
GetLastError
OpenFileMappingA
CreateFileMappingA
MapViewOfFile
lstrcpynA
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
FreeEnvironmentStringsA
GetStdHandle
HeapReAlloc
VirtualAlloc
DeleteCriticalSection
VirtualFree
HeapSize
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetTickCount
RtlUnwind
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualQuery
HeapCreate
QueryPerformanceCounter
GetClassNameA
EnumWindows
GetWindowThreadProcessId
GetShellWindow
GetUserObjectSecurity
IsWindow
IsWindowVisible
GetSecurityDescriptorOwner
IsValidSid
OpenProcessToken
GetTokenInformation
LookupAccountSidA
LookupPrivilegeValueA
AdjustTokenPrivileges
ConvertSidToStringSidA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyA
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
GetUserNameA
RegOpenKeyA
RegCloseKey
OpenSCManagerA
OpenServiceA
QueryServiceStatus
CloseServiceHandle
ShellExecuteA
SHGetFolderPathA
ord680
CoInitialize
CoUninitialize
CoCreateInstance
VariantClear
wnsprintfA
AssocQueryStringA
StrDupA
StrChrA
PathFileExistsA
StrStrIA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ