Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
c847ca4319b8d7c4c4112d4f636e5d2d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c847ca4319b8d7c4c4112d4f636e5d2d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
c847ca4319b8d7c4c4112d4f636e5d2d_JaffaCakes118
Size
1.3MB
MD5
c847ca4319b8d7c4c4112d4f636e5d2d
SHA1
45dc11f4aad1d0b27f6f72782ecc576f59a83def
SHA256
6f65f563c12d7e98133903ebb622737f5c46a47d6ea4868b2876fcfa45eca4d3
SHA512
a7e4c8168ed511b8280ed4d9bf32b89d01ed6d56839de017b08490392b4098fe0f31d66033bf10ba572f4201628ff2763d9bb650873e27938b0fb442ea7a2bb8
SSDEEP
24576:YUb+oqJb7Z1P/bz3oW98zSZ0nDIReQAhdbpHHZZZuJBEcJra:Ye+RR7Z1P/bz3oW98zSZ0nDkubpHHZZn
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
E:\JA\workspace\tv_publicrelease-windows-15.9.4\build_cmake_win_HOOKS\Release\tv_x64exe.pdb
ReadFile
SetLastError
GetModuleFileNameW
CreateFileW
CreateEventW
Sleep
GetLastError
SetEvent
CloseHandle
GetWindowsDirectoryW
LocalFree
VerSetConditionMask
VerifyVersionInfoW
GetTickCount
GetModuleFileNameA
LoadLibraryA
GetProcAddress
FreeLibrary
GetSystemDirectoryW
LoadLibraryW
SetWaitableTimer
CreateWaitableTimerW
OpenMutexW
WriteFile
SetFilePointer
CreateMutexW
WaitForSingleObject
GetCurrentThreadId
ReleaseMutex
GetLocalTime
GetCurrentProcessId
GetCommandLineW
GetCurrentProcess
LoadLibraryExA
GetModuleHandleA
GetSystemDirectoryA
GetFileAttributesW
ResetEvent
OpenEventA
CreateEventA
WaitForSingleObjectEx
SetSearchPathMode
SetDllDirectoryW
HeapSetInformation
SetProcessDEPPolicy
EnterCriticalSection
WaitForMultipleObjects
LeaveCriticalSection
FormatMessageW
TerminateThread
TlsAlloc
QueueUserAPC
DeleteCriticalSection
WideCharToMultiByte
TlsFree
FormatMessageA
LoadLibraryExW
GetSystemInfo
CreateDirectoryW
InitializeCriticalSection
SetFilePointerEx
GetFileSize
UnregisterWaitEx
FindNextFileW
FindClose
TerminateProcess
RegisterWaitForSingleObject
DuplicateHandle
ReleaseSemaphore
MultiByteToWideChar
GetProcessHeap
HeapFree
HeapAlloc
RaiseException
SetThreadPriority
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThread
GetThreadTimes
GetSystemTimeAsFileTime
TlsGetValue
TlsSetValue
InitializeCriticalSectionAndSpinCount
VirtualProtect
VirtualQuery
GetModuleHandleW
GetStringTypeW
TryEnterCriticalSection
EncodePointer
DecodePointer
SwitchToThread
LCMapStringW
GetLocaleInfoW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetLogicalProcessorInformation
SignalObjectAndWait
CreateThread
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
UnregisterWait
FreeLibraryAndExitThread
GetVersionExW
VirtualAlloc
VirtualFree
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
CreateTimerQueue
RtlUnwindEx
RtlPcToFileHeader
GetModuleHandleExW
ExitProcess
GetStdHandle
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
HeapSize
FlushFileBuffers
GetConsoleCP
GetConsoleMode
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
WriteConsoleW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ