Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
b8f452ff4f4fdfa0683c90422f7fffd8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b8f452ff4f4fdfa0683c90422f7fffd8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
b8f452ff4f4fdfa0683c90422f7fffd8_JaffaCakes118
Size
3.8MB
MD5
b8f452ff4f4fdfa0683c90422f7fffd8
SHA1
97650ed7b4a88b0fb23c9d4ec3ba5637d463594e
SHA256
f7b915a7cb8c0523a356315234e1f955702bdfc5c86e66286f5fa086d2692745
SHA512
42a2482c9385b740d9aeaee6f449fed12ada71547dfb69de0785b47dc964847d55a560e0cdacba2f433e7e6457aa6e32bf433a7432fb94083b8e717e0df9265b
SSDEEP
98304:LM0fZaQOhEM0fZaQOhQM0fZaQOhwM0fZaQOh:LBLOuBLOSBLOCBLO
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\a\1\b\bin\win32\pyw.pdb
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegQueryValueExW
SHGetFolderPathW
WriteConsoleW
SetEndOfFile
EnterCriticalSection
HeapReAlloc
HeapSize
CreateFileW
GetStartupInfoW
SetConsoleCtrlHandler
SetInformationJobObject
QueryInformationJobObject
SearchPathW
GetBinaryTypeW
GetCommandLineW
GetCurrentProcess
GetStdHandle
AssignProcessToJobObject
GetModuleFileNameW
SetEnvironmentVariableW
CreateJobObjectW
GetEnvironmentVariableW
GetFileAttributesW
DuplicateHandle
MultiByteToWideChar
GetPrivateProfileStringW
FormatMessageW
GetLastError
WaitForSingleObjectEx
CloseHandle
CreateProcessW
IsWow64Process
GetExitCodeProcess
SetFilePointerEx
GetFileSizeEx
GetProcessHeap
SetStdHandle
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
SetLastError
DecodePointer
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
ExitProcess
GetModuleHandleExW
GetCommandLineA
WriteFile
HeapFree
HeapAlloc
GetCurrentThread
GetFileType
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetStringTypeW
ReadFile
ReadConsoleW
OutputDebugStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
MessageBoxW
PostMessageW
GetMessageW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ